Abstract
Cloud computing security is the key bottleneck that restricts its development, and access control on the result of cloud computing is a hot spot of current research. Based on the somewhat homomorphic encryption BGN and combined with Green’s scheme that proposed outsourcing the decryption of CP-ABE (Ciphertext-Policy Attribute-Based Encryption) ciphertexts, we constructed a BGN type outsourcing the decryption of CP-ABE ciphertexts. In our construction, partial decryption of ciphertexts is outsourced to the cloud, and only users whose attribute meets the access policy will get the correct decryption. And the scheme supports arbitrary homomorphic additions and one homomorphic multiplication on ciphertexts. Finally, we prove its semantic security under the subgroup decision assumption and compare it with other schemes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Hand, E.: Head in the clouds. Nature 449(7165), 963 (2007)
Alamareen, A., Al-Jarrah, O., Aljarrah, I.A.: Image mosaicing using binary edge detection algorithm in a cloud-computing environment. Int. J. Inf. Technol. Web. Eng. 11(3), 1–14 (2016)
Almiani, M., Razaque, A., Al-Dmour, A.: Privacy preserving framework to support mobile government services. Int. J. Inf. Technol. Web. Eng. 11(3), 65–78 (2016)
Dam, H.K., Ghose, A., Qasim, M.: An agent-mediated platform for business processes. Int. J. Inf. Technol. Web. Eng. 10(2), 43–61 (2015)
Mezghani, K., Ayadi, F.: Factors explaining IS managers attitudes toward cloud computing adoption. Int. J. Technol. Human Interact. 12(1), 1–20 (2016)
Khan, N., Al-Yasiri, A.: Cloud security threats and techniques to strengthen cloud computing adoption framework. Int. J. Inf. Technol. Web. Eng. 11(3), 50–64 (2016)
Kaufman, L.M.: Data security in the world of cloud computing. IEEE Secur. Priv. 7(4), 61–64 (2009)
Shamir A.: Identity-based cryptosystems and signature schemes. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 47–53. Springer, Heidelberg (1984)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457–473. Springer, Heidelberg (2005)
Pirretti, M., Traynor, P., McDaniel, P., et al.: Secure attribute-based systems. J. Comput. Secur. 18(5), 799–837 (2010)
Ning, J., Dong, X., Cao, Z., et al.: White-box traceable ciphertext-policy attribute-based encryption supporting flexible attributes. IEEE Trans. Inf. Forensics Secur. 10(6), 1 (2015)
Zhang, K., Ma, J., Liu, J., et al.: Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption. Sci. China Inf. Sci. (2016)
Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: USENIX Security Symposium (2011)
Wan, Z., Liu, J., Deng, R.H.: HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. Inf. Forensics Secur. 7(2), 743–754 (2012)
Yang, K., Jia, X., Ren, K., et al.: DAC-MACS: effective data access control for multi-authority cloud storage systems. IEEE Trans. Inf. Forensics Secur. 8(11), 1790–1801 (2013)
Wang, S., Zhou, J., Liu, J., et al.: An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Trans. Inf. Forensics Secur. 11(6), 1 (2016)
Boneh, D., Goh, E.J., Nissim, K.: Evaluating 2-DNF formulas on ciphertexts. In: Theory of Cryptography Conference, pp. 325–341. Springer, Heidelberg (2005)
Beimel A.: Secure schemes for secret sharing and key distribution. Int. J. Pure Appl. Math. (1996)
Rivest, R.L., Adleman, L., Dertouzos, M.L.: On data banks and privacy homomorphisms. Found. Secure Comput. 4(11), 169–180 (1978)
Gentry, C., Halevi, S., Vaikuntanathan, V.: A simple BGN-type cryptosystem from LWE. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 506–522. Springer, Heidelberg (2010)
Menezes, A.J., Oorschot, P.V., Vanstone, S.A.: Handbook of Applied Cryptography, pp. 425–488. CRC Press, Boca Raton (1999)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer International Publishing AG
About this paper
Cite this paper
Zhenlin, L., Wei, Z., Yitao, D., Ping, B. (2018). A BGN Type Outsourcing the Decryption of CP-ABE Ciphertexts. In: Barolli, L., Zhang, M., Wang, X. (eds) Advances in Internetworking, Data & Web Technologies. EIDWT 2017. Lecture Notes on Data Engineering and Communications Technologies, vol 6. Springer, Cham. https://doi.org/10.1007/978-3-319-59463-7_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-59463-7_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-59462-0
Online ISBN: 978-3-319-59463-7
eBook Packages: EngineeringEngineering (R0)