Cargando…

Analysis of an ABE Scheme with Verifiable Outsourced Decryption

Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption op...

Descripción completa

Detalles Bibliográficos
Autores principales: Liao, Yongjian, He, Yichuan, Li, Fagen, Jiang, Shaoquan, Zhou, Shijie
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2018
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5795761/
https://www.ncbi.nlm.nih.gov/pubmed/29320418
http://dx.doi.org/10.3390/s18010176
_version_ 1783297358575960064
author Liao, Yongjian
He, Yichuan
Li, Fagen
Jiang, Shaoquan
Zhou, Shijie
author_facet Liao, Yongjian
He, Yichuan
Li, Fagen
Jiang, Shaoquan
Zhou, Shijie
author_sort Liao, Yongjian
collection PubMed
description Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their “verify-then-decrypt” skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user.
format Online
Article
Text
id pubmed-5795761
institution National Center for Biotechnology Information
language English
publishDate 2018
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-57957612018-02-13 Analysis of an ABE Scheme with Verifiable Outsourced Decryption Liao, Yongjian He, Yichuan Li, Fagen Jiang, Shaoquan Zhou, Shijie Sensors (Basel) Article Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their “verify-then-decrypt” skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user. MDPI 2018-01-10 /pmc/articles/PMC5795761/ /pubmed/29320418 http://dx.doi.org/10.3390/s18010176 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Liao, Yongjian
He, Yichuan
Li, Fagen
Jiang, Shaoquan
Zhou, Shijie
Analysis of an ABE Scheme with Verifiable Outsourced Decryption
title Analysis of an ABE Scheme with Verifiable Outsourced Decryption
title_full Analysis of an ABE Scheme with Verifiable Outsourced Decryption
title_fullStr Analysis of an ABE Scheme with Verifiable Outsourced Decryption
title_full_unstemmed Analysis of an ABE Scheme with Verifiable Outsourced Decryption
title_short Analysis of an ABE Scheme with Verifiable Outsourced Decryption
title_sort analysis of an abe scheme with verifiable outsourced decryption
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5795761/
https://www.ncbi.nlm.nih.gov/pubmed/29320418
http://dx.doi.org/10.3390/s18010176
work_keys_str_mv AT liaoyongjian analysisofanabeschemewithverifiableoutsourceddecryption
AT heyichuan analysisofanabeschemewithverifiableoutsourceddecryption
AT lifagen analysisofanabeschemewithverifiableoutsourceddecryption
AT jiangshaoquan analysisofanabeschemewithverifiableoutsourceddecryption
AT zhoushijie analysisofanabeschemewithverifiableoutsourceddecryption