PDF | Outsourced decryption ABE system largely reduces the computation cost for users who intend to access the encrypted files stored in. Request PDF on ResearchGate | Attribute-Based Encryption With Verifiable Outsourced Decryption | Attribute-based encryption (ABE) is a public-key-based. , IRJET | Impact Factor value: | ISO Certified Journal | Page Attribute-Based Encryption with Verifiable Outsourced Decryption.
|Published (Last):||16 May 2012|
|PDF File Size:||13.7 Mb|
|ePub File Size:||17.38 Mb|
|Price:||Free* [*Free Regsitration Required]|
The notation denotes that an attribute set satisfies an access structure ; that is to say. It outputs transformation key associated with and a corresponding retrieving key. Moreover, the CSP can perform encrypted keyword search without knowing anything about encryyption keywords embedded in trapdoor.
Definition 2 discrete logarithm DL assumption [ 31 ].
As the amount of encrypted files stored in cloud is becoming very huge, searchable encryption scheme over encrypted cloud data is a very challenging issue. Therefore, our scheme greatly reduces the communication overhead and is very suitable for bandwidth limited devices.
Verifiable Outsourced Decryption of Attribute-Based Encryption with Constant Ciphertext Length
It is described by the seven algorithms as follows. Therefore, our scheme is very efficient.
We also implement the scheme [ 31 outsourcced for comparison. If has a nonnegligible advantage inthen attacks the scheme in [ 33 ] at a nonnegligible advantage. This algorithm takes and as input.
Security and Communication Networks
Abstract Outsourced decryption ABE system largely outsoufced the computation cost for users who intend to access the encrypted files stored in cloud. Outsourced decryption ABE system largely reduces the computation cost for users who intend to access the encrypted files stored in cloud. The identity represented by an attribute set is not unique so ABE can realize the one-to-many encryption. In order to solve this problem, Lai et al. The user only needs to spend less computational overhead to recover the plaintext from simple ciphertext.
It sends to the adversary.
HKU Scholars Hub: Offline/online attribute-based encryption with verifiable outsourced decryption
Security in our scheme is reduced to that of scheme in [ 33 ] and verifiability is reduced to DL assumption. This algorithm takesmessageand access structure as input and outputs ciphertext. Inthe challenger randomly selects and generates the remaining parts of the challenge ciphertext as in. We find an algorithm that can solve the DL problem at nonnegligible advantage. If such a tuple exists, it sends the transformation key to. With the cloud service being more and more popular in modern society, ABE technology wkth become a promising orientation.
Let be a prime-order bilinear group system. We suppose that tuple is included in table.
Figure 6 illustrates that the length of partially decrypted ciphertext in two schemes is almost same. Table 1 illustrates that the size of private key, ciphertext, and transform key oktsourced our scheme is constant.
Without loss of generality, we suppose that an adversary does not launch transformation key query for attribute setif a private key query about the same attribute set has been issued. Note that, with overwhelming probability, has multiplicative inverse. Namely, and decryption queries encrypion replied to as phase 1; if the response is either orthen returns.
Assume that the scheme in [ 33 ] is selectively CPA-secure; and are computationally indistinguishable. It outputs a partially decrypted ciphertext. To receive news and publication updates for Security and Communication Networks, enter your email address in the box below.
Recently, Li et al. This algorithm takes the security parameter and attribute universe as input. TA selectscomputes andand sends to a user associated with attribute set. Data owner encrypts message into ciphertext and uploads it to the storage in cloud.