Cargando…
Analysis of an ABE Scheme with Verifiable Outsourced Decryption
Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption op...
Autores principales: | , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5795761/ https://www.ncbi.nlm.nih.gov/pubmed/29320418 http://dx.doi.org/10.3390/s18010176 |
_version_ | 1783297358575960064 |
---|---|
author | Liao, Yongjian He, Yichuan Li, Fagen Jiang, Shaoquan Zhou, Shijie |
author_facet | Liao, Yongjian He, Yichuan Li, Fagen Jiang, Shaoquan Zhou, Shijie |
author_sort | Liao, Yongjian |
collection | PubMed |
description | Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their “verify-then-decrypt” skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user. |
format | Online Article Text |
id | pubmed-5795761 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2018 |
publisher | MDPI |
record_format | MEDLINE/PubMed |
spelling | pubmed-57957612018-02-13 Analysis of an ABE Scheme with Verifiable Outsourced Decryption Liao, Yongjian He, Yichuan Li, Fagen Jiang, Shaoquan Zhou, Shijie Sensors (Basel) Article Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their “verify-then-decrypt” skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user. MDPI 2018-01-10 /pmc/articles/PMC5795761/ /pubmed/29320418 http://dx.doi.org/10.3390/s18010176 Text en © 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/). |
spellingShingle | Article Liao, Yongjian He, Yichuan Li, Fagen Jiang, Shaoquan Zhou, Shijie Analysis of an ABE Scheme with Verifiable Outsourced Decryption |
title | Analysis of an ABE Scheme with Verifiable Outsourced Decryption |
title_full | Analysis of an ABE Scheme with Verifiable Outsourced Decryption |
title_fullStr | Analysis of an ABE Scheme with Verifiable Outsourced Decryption |
title_full_unstemmed | Analysis of an ABE Scheme with Verifiable Outsourced Decryption |
title_short | Analysis of an ABE Scheme with Verifiable Outsourced Decryption |
title_sort | analysis of an abe scheme with verifiable outsourced decryption |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5795761/ https://www.ncbi.nlm.nih.gov/pubmed/29320418 http://dx.doi.org/10.3390/s18010176 |
work_keys_str_mv | AT liaoyongjian analysisofanabeschemewithverifiableoutsourceddecryption AT heyichuan analysisofanabeschemewithverifiableoutsourceddecryption AT lifagen analysisofanabeschemewithverifiableoutsourceddecryption AT jiangshaoquan analysisofanabeschemewithverifiableoutsourceddecryption AT zhoushijie analysisofanabeschemewithverifiableoutsourceddecryption |