Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud

IF 4.1 2区 计算机科学 Q1 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Computer Standards & Interfaces Pub Date : 2024-03-20 DOI:10.1016/j.csi.2024.103854
Zesen Hou , Jianting Ning , Xinyi Huang , Shengmin Xu , Leo Yu Zhang
{"title":"Blockchain-based efficient verifiable outsourced attribute-based encryption in cloud","authors":"Zesen Hou ,&nbsp;Jianting Ning ,&nbsp;Xinyi Huang ,&nbsp;Shengmin Xu ,&nbsp;Leo Yu Zhang","doi":"10.1016/j.csi.2024.103854","DOIUrl":null,"url":null,"abstract":"<div><p>Attribute-based encryption (ABE) has been widely applied in cloud services for access control. However, a large number of pairing operations required for decryption affect the wide use of ABE on lightweight devices. A general solution is to outsource the heavy computation to the cloud service provider (CSP), leaving the lighter computation to the data user. Nevertheless, it is impractical to assume that the CSP will provide free services. A recent ABE scheme with payable outsourced decryption <span><math><msub><mrow><mi>ABE</mi></mrow><mrow><mi>POD</mi></mrow></msub></math></span> (TIFS’20) provides a solution for the above payment issue. The CSP is generally untrusted, however, <span><math><msub><mrow><mi>ABE</mi></mrow><mrow><mi>POD</mi></mrow></msub></math></span> does not offer a verification mechanism for the data user to verify the correctness of the message. Moreover, the use of dual key pairs in <span><math><msub><mrow><mi>ABE</mi></mrow><mrow><mi>POD</mi></mrow></msub></math></span> incurs a significant computational overhead for data users during the key generation phase. We address the above issues by presenting a new <em>blockchain-based verifiable outsourced attribute-based encryption</em> system that enables data users to verify the correctness of plaintexts. We implement batch verification using homomorphic technical to optimize the verification process. We use the technique of dichotomous search to accurately locate problematic plaintexts. Additionally, we optimize three key-generation algorithms to transfer the computational cost from the data user to the key generation center. We offer the formal security models and the instantiation system with security analysis. As compared to <span><math><msub><mrow><mi>ABE</mi></mrow><mrow><mi>POD</mi></mrow></msub></math></span>, we further optimize the key-generation algorithms such that the computational overhead of transformation-key and verification-key generation for data users is reduced from O(<span><math><mi>Ω</mi></math></span>) to O(1) and reduced by half respectively, where <span><math><mi>Ω</mi></math></span> is the number of attributes.</p></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"90 ","pages":"Article 103854"},"PeriodicalIF":4.1000,"publicationDate":"2024-03-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computer Standards & Interfaces","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0920548924000230","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0

Abstract

Attribute-based encryption (ABE) has been widely applied in cloud services for access control. However, a large number of pairing operations required for decryption affect the wide use of ABE on lightweight devices. A general solution is to outsource the heavy computation to the cloud service provider (CSP), leaving the lighter computation to the data user. Nevertheless, it is impractical to assume that the CSP will provide free services. A recent ABE scheme with payable outsourced decryption ABEPOD (TIFS’20) provides a solution for the above payment issue. The CSP is generally untrusted, however, ABEPOD does not offer a verification mechanism for the data user to verify the correctness of the message. Moreover, the use of dual key pairs in ABEPOD incurs a significant computational overhead for data users during the key generation phase. We address the above issues by presenting a new blockchain-based verifiable outsourced attribute-based encryption system that enables data users to verify the correctness of plaintexts. We implement batch verification using homomorphic technical to optimize the verification process. We use the technique of dichotomous search to accurately locate problematic plaintexts. Additionally, we optimize three key-generation algorithms to transfer the computational cost from the data user to the key generation center. We offer the formal security models and the instantiation system with security analysis. As compared to ABEPOD, we further optimize the key-generation algorithms such that the computational overhead of transformation-key and verification-key generation for data users is reduced from O(Ω) to O(1) and reduced by half respectively, where Ω is the number of attributes.

查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于区块链的高效可验证外包云端属性加密
基于属性的加密(ABE)已广泛应用于云服务的访问控制。然而,解密所需的大量配对操作影响了 ABE 在轻型设备上的广泛应用。一般的解决方案是将繁重的计算外包给云服务提供商(CSP),将较轻的计算留给数据用户。然而,假设云服务提供商将提供免费服务是不切实际的。最近推出的一种可支付外包解密 ABEPOD 的 ABE 方案(TIFS'20)为上述支付问题提供了一种解决方案。CSP 通常是不可信任的,但 ABEPOD 没有为数据用户提供验证机制来验证信息的正确性。此外,ABEPOD 中双密钥对的使用在密钥生成阶段给数据用户带来了巨大的计算开销。针对上述问题,我们提出了一种新的基于区块链的可验证外包属性加密系统,使数据用户能够验证明文的正确性。我们使用同态技术实现批量验证,以优化验证过程。我们使用二分搜索技术来准确定位有问题的明文。此外,我们还优化了三种密钥生成算法,将计算成本从数据用户转移到密钥生成中心。我们提供了正式的安全模型和实例化系统,并进行了安全分析。与 ABEPOD 相比,我们进一步优化了密钥生成算法,使数据用户生成转换密钥和验证密钥的计算开销分别从 O(Ω) 降至 O(1) 和减少一半,其中 Ω 是属性数。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Computer Standards & Interfaces
Computer Standards & Interfaces 工程技术-计算机:软件工程
CiteScore
11.90
自引率
16.00%
发文量
67
审稿时长
6 months
期刊介绍: The quality of software, well-defined interfaces (hardware and software), the process of digitalisation, and accepted standards in these fields are essential for building and exploiting complex computing, communication, multimedia and measuring systems. Standards can simplify the design and construction of individual hardware and software components and help to ensure satisfactory interworking. Computer Standards & Interfaces is an international journal dealing specifically with these topics. The journal • Provides information about activities and progress on the definition of computer standards, software quality, interfaces and methods, at national, European and international levels • Publishes critical comments on standards and standards activities • Disseminates user''s experiences and case studies in the application and exploitation of established or emerging standards, interfaces and methods • Offers a forum for discussion on actual projects, standards, interfaces and methods by recognised experts • Stimulates relevant research by providing a specialised refereed medium.
期刊最新文献
Grammar-obeying program synthesis: A novel approach using large language models and many-objective genetic programming LAMB: An open-source software framework to create artificial intelligence assistants deployed and integrated into learning management systems A lightweight finger multimodal recognition model based on detail optimization and perceptual compensation embedding Developing a behavioural cybersecurity strategy: A five-step approach for organisations A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1