Abstract
Attribute based encryption (ABE) was used to ensure confidentiality and access control in IoT as a preeminent cryptographic primitive. However, the traditional ABE with outsourced decryption cannot achieve public verifiability for decryption results. In this paper, blockchain technology is appplied to realize the publicly verifiability in our CP-ABE scheme. Furthermore, our scheme has many characteristics: white box traceability, malicious users revocability and updatability of ciphertext. Lastly, we present the security analysis and demonstrate the performance of our scheme. The results show that our scheme is IND-CPA secure under the standard model and also has high efficiency.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bandyopadhyay, D., Sen, J.: Internet of things: applications and challenges in technology and standardization. Wirel. Pers. Commun 58(1), 49–69 (2011). https://doi.org/10.1007/s11277-011-0288-5
Xu, G., Zhao, Y., Jiao, L., et al.: TT-SVD: an efficient sparse decision making model with two-way trust recommendation in the AI enabled IoT systems. IEEE Internet Things J. 1 (2020)
Xu, G., Liu, B., Jiao, L., et al.: Trust2Privacy: a novel fuzzy trust-to-privacy mechanism for mobile social networks. IEEE Wirel. Commun. 27(3), 72–78 (2020)
Lu, R., Zhu, H., Liu, X., et al.: Toward efficient and privacy-preserving computing in big data era. IEEE Netw. 28(4), 46–50 (2014)
Xu, G., Wang, W., Jiao, L., et al.: SoProtector: safeguard privacy for native SO files in evolving mobile IoT applications. IEEE Internet Things J. 7(4), 2539–2552 (2020)
Li, L., Xu, G., Jiao, L., et al.: A secure random key distribution scheme against node replication attacks in industrial wireless sensor systems. IEEE Trans Ind. Inform. 16(3), 2091–2101 (2020)
Ni, J., Zhang, K., Lin, X., et al.: Securing fog computing for internet of things applications: challenges and solutions. IEEE Commun. Surv. Tutor. 20(1), 601–628 (2017)
Xu, G., Zhang, Y., Jiao, L., et al.: DT-CP: a double-TTPs-based contract-signing protocol with lower computational cost. IEEE Access. 7, 174740–174749 (2019)
Xu, G., Zhou, W., Sangaiah, A.K., et al.: A security-enhanced certificateless aggregate signature authentication protocol for InVANETs. IEEE Netw. 34(2), 22–29 (2020)
Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 457–473. ACM, Aarhus (2005)
Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE, Berkeley (2007)
Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine grained access control of encrypted data. In: 13th ACM Conference on Computer and Communications Security, pp. 89–98. ACM, Alexandria (2006)
Liu, Z., Cao, Z., Wong, D.: White-box traceable ciphertext-policy attribute-based encryption supporting any monotone access structures. IEEE Trans. Inf. Foren. Secur. 8(1), 76–88 (2013)
Ning, J., Cao, Z., Dong, X., Wei, L., Lin, X.: Large universe ciphertext-policy attribute-based encryption with white-box traceability. In: Kutyłowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8713, pp. 55–72. Springer, Cham (2014). https://doi.org/10.1007/978-3-319-11212-1_4
Liu, Z., Wong, D.: Practical attribute-based encryption: traitor tracing, revocation and large universe. Comput. J. 59(7), 983–1004 (2016)
Liu, Z., Duan, S., Zhou, P., et al.: Traceable-then-revocable ciphertext-policy attribute-based encryption scheme. Future Gener. Comput. Syst. 93, 903–913 (2019)
Gree, M., Hohenberger, S., Waters, B., et al.: Outsourcing the decryption of ABE ciphertexts. In: Proceedings of the 20th USENIX Conference on Security, p. 34. ACM, San Francisco (2011)
Lai, J., Deng, R., Guan, C., et al.: Attribute-based encryption with verifiable outsourced decryption. IEEE Trans. Inf. Foren. Secur. 8(8), 1343–1354 (2013)
Li, J., Wang, Y., Zhang, Y., et al.: Full verifiability for outsourced decryption in attribute based encryption. IEEE Trans. Serv. Comput. 13(3), 478–487 (2017)
Huang, X., Li, J., Li, J., et al.: Securely outsourcing attribute-based encryption with checkability. IEEE Trans. Parallel Distrib. Syst. 25(8), 2201–2210 (2014)
Kumaresan, R., Bentov, I.: How to use bitcoin to incentivize correct computations. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS, USA, pp. 30–41 (2014)
Guo, R., Shi, H., Zheng, D., et al.: Flexible and efficient blockchain-based ABE scheme with multi-authority for medical on demand in telemedicine system. IEEE Access 7, 88012–88025 (2019)
Azaria, A., Ekblaw, A., Vieria T., et al.: MedRec: using blockchain for medical data access and permission management. In: 2016 2nd International Conference on Open and Big Data (OBD), pp. 25–30. IEEE, Vienna (2016)
Huang, H., Chen, X., Wu, Q., et al.: Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener. Comput. Syst. 78, 850–858 (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Xie, M., Hu, J., Hong, H. (2020). Blockchain-Based CP-ABE with Publicly Verifiable Outsourced Decryption in IoT. In: Xu, G., Liang, K., Su, C. (eds) Frontiers in Cyber Security. FCS 2020. Communications in Computer and Information Science, vol 1286. Springer, Singapore. https://doi.org/10.1007/978-981-15-9739-8_1
Download citation
DOI: https://doi.org/10.1007/978-981-15-9739-8_1
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-9738-1
Online ISBN: 978-981-15-9739-8
eBook Packages: Computer ScienceComputer Science (R0)