Skip to main content
Log in

Attribute-based encryption with outsourced decryption in blockchain

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

Attribute-based encryption (ABE) is a powerful cryptographic primitive for access control and fine-grained sharing on encrypted data. Due to this functionality, ABE is usually adopted in encrypted cloud storage for flexible data sharing. However, the main drawback of ABE is that the computational cost grows linearly with the complexity of the access policy. One of the promising solutions for the problem is to outsource computation securely. For example, the user can outsource most of the decryption cost to a proxy, while the underlying plaintext remains confidential. Nonetheless, all the existing ABE schemes with outsourced decryption ignore the fairness between the user and the proxy, i.e., the user may refuse to pay even if he/she obtain the valid result. To address this problem, in this paper we propose a new ABE scheme with fair outsourced decryption by using blockchain and sampling technique. In particular, we make use of the smart contract in blockchain to guarantee that the proxy can always get the reward with the valid outsourced decryption result. Furthermore, we apply the sampling technique to enable the miners in blockchain to check the validity of the outsourced decryption result. The detailed analysis conducts that our proposal is secure and fair under some reasonable assumptions, and the experimental results demonstrate that our proposal is efficient. At last, it may be of independent interest that our proposal is a generic construction for pairing-based ABE schemes.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

Notes

  1. https://sslmate.com/certspotter/failures

  2. https://coinmarketcap.com/currencies/bitcoin/

  3. https://github.com/ethereum/wiki/wiki/Ethereum-introduction

  4. https://protocol.ai/

References

  1. Beimel A (1996) Secure schemes for secret sharing and key distribution

  2. Benet J (2014) Ipfs-content addressed, versioned, p2p file system. arXiv:1407.3561

  3. Campanelli M, Gennaro R, Goldfeder S, Nizzardo L (2017) Zero-knowledge contingent payments revisited: Attacks and payments for services. In: ACM CCS, pp 229–243

  4. Canetti R, Riva B, Rothblum GN (2011) Practical delegation of computation using multiple servers. In: ACM CCS, pp 445–454

  5. Canetti R, Riva B, Rothblum GN (2012) Two protocols for delegation of computation. In: Information theoretic security - 6th international conference, ICITS, pp 37–61

  6. Canetti R, Riva B, Rothblum GN (2013) Refereed delegation of computation. Inf Comput 226:16–36

    Article  MathSciNet  Google Scholar 

  7. Dong C, Wang Y, Aldweesh A, McCorry P, van Moorsel A (2017) Betrayal, distrust, and rationality: smart counter-collusion contracts for verifiable cloud computing. In: ACM CCS, pp 211–227

  8. Feige U, Kilian J (1997) Making games short (extended abstract). In: ACM STOC, pp 506–516

  9. Gokuldev S, Leelavathi S (2013) Hasbe: a hierarchical attribute-based solution for flexible and scalable access control by separate encryption/decryption in cloud computing. International Journal of Engineering Science and Innovative Technology (IJESIT) 2(3)

  10. Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: ACM CCS, pp 89–98

  11. Green M, Hohenberger S, Waters B, et al. (2011) Outsourcing the decryption of abe ciphertexts. In: USENIX Security symposium, vol 2011

  12. Guo F, Mu Y, Susilo W, Wong DS, Varadharajan V (2014) Cp-abe with constant-size keys for lightweight devices. IEEE Trans Inform Forens Secur 9(5):763–771

    Article  Google Scholar 

  13. Hu S, Cai C, Wang Q, Wang C, Luo X, Ren K (2018) Searching an encrypted cloud meets blockchain: a decentralized, reliable and fair realization. In: IEEE INFOCOM, pp 792–800

  14. Huang H, Chen X, Wu Q, Huang X, Shen J (2018) Bitcoin-based fair payments for outsourcing computations of fog devices. Future Generation Comp. Syst. 78:850–858

    Article  Google Scholar 

  15. Koppula V, Waters B (2019) Realizing chosen ciphertext security generically in attribute-based encryption and predicate encryption. In: CRYPTO, pp 671–700

  16. Król M, Psaras I (2018) SPOC: secure payments for outsourced computations. arXiv:1807.06462

  17. Kumaresan R, Bentov I (2014) How to use bitcoin to incentivize correct computations. In: ACM CCS, pp 30–41

  18. Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inform Forens Secur 8(8):1343–1354

    Article  Google Scholar 

  19. Lewko A, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: CRYPTO. Springer, pp 62–91

  20. Li J, Huang X, Li J, Chen X, Xiang Y (2013) Securely outsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst 25(8):2201–2210

    Article  Google Scholar 

  21. Li J, Shi Y, Zhang Y (2017) Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage. Int J Commun Syst 30(1):e2942

    Article  Google Scholar 

  22. Li J, Wang Y, Zhang Y, Han J (2017) Full verifiability for outsourced decryption in attribute based encryption. IEEE Transactions on Services Computing

  23. Li J, Zhang Y, Chen X, Xiang Y (2018) Secure attribute-based data sharing for resource-limited users in cloud computing. Comput Secur 72:1–12

    Article  Google Scholar 

  24. Li W, Xue K, Xue Y, Hong J (2015) Tmacs: a robust and verifiable threshold multi-authority access control system in public cloud storage. IEEE Trans Parallel Distrib Syst 27(5):1484–1496

    Article  Google Scholar 

  25. Liao Y, He Y, Li F, Jiang S, Zhou S (2018) Analysis of an abe scheme with verifiable outsourced decryption. Sensors 18(1):176

    Article  Google Scholar 

  26. Lin C, He D, Huang X, Xie X, Choo KKR (2018) Blockchain-based system for secure outsourcing of bilinear pairings. Information Sciences

  27. Lin S, Zhang R, Ma H, Wang M (2015) Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inform Forens Secur 10(10):2119–2130

    Article  Google Scholar 

  28. Lynn B, et al. (2006) The pairing-based cryptography library. Internet: crypto. stanford. edu/pbc/[Mar. 27 2013]

  29. Mao X, Lai J, Mei Q, Chen K, Weng J (2015) Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans Depend Secur Comput 13(5):533–546

    Article  Google Scholar 

  30. sNakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system

  31. Qin B, Deng RH, Liu S, Ma S (2015) Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans Inform Forens Secur 10(7):1384–1393

    Article  Google Scholar 

  32. Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: CRYPTO, pp 457–473

  33. Szabo N (1997) Formalizing and securing relationships on public networks. First Monday 2(9)

  34. Wang S, Zhou J, Liu JK, Yu J, Chen J, Xie W (2016) An efficient file hierarchy attribute-based encryption scheme in cloud computing. IEEE Transactions on Information Forensics and Security 11(6):1265–1277

    Article  Google Scholar 

  35. Waters B (2011) Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Public key cryptography, pp 53–70

  36. Wu J, Ping L, Ge X, Wang Y, Fu J (2010) Cloud storage as the infrastructure of cloud computing. In: 2010 International conference on intelligent computing and cognitive informatics, pp 380–383

  37. Xu J, Wen Q, Li W, Jin Z (2015) Circuit ciphertext-policy attribute-based hybrid encryption with verifiable delegation in cloud computing. IEEE Trans Parallel Distrib Syst 27(1):119– 129

    Article  Google Scholar 

  38. Zheng H, Shao J, Wei G, Hu L, Pan B, Liu K, Mao X (2019) Attribute-based encryption with publicly verifiable outsourced decryption. In: International conference on network and system security. Springer, pp 552–566

  39. Zhou Z, Huang D (2012) Efficient and secure data storage operations for mobile cloud computing. In: 2012 8th international conference on Network and service management (cnsm) and 2012 workshop on systems virtualiztion management (svm) , pp 37–45

  40. Zuo C, Shao J, Wei G, Xie M, Ji M (2018) Cca-secure abe with outsourced decryption for fog computing. Futur Gener Comput Syst 78:730–738

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank the anonymous reviewers for their invaluable comments. This work was supported in part by the Natural Science Foundation of Zhejiang under Grant LR18F020003 and the National Natural Science Foundation of China under Grant U1709217.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Jun Shao.

Additional information

Publisher’s note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This work extends the paper that was published at NSS 2019 (Zheng, et al. [38])

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zheng, H., Shao, J. & Wei, G. Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Netw. Appl. 13, 1643–1655 (2020). https://doi.org/10.1007/s12083-020-00918-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-020-00918-1

Keywords

Navigation