Skip to main content
Log in

Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation

  • Original Research
  • Published:
Save article
View saved research
Journal of Ambient Intelligence and Humanized Computing Aims and scope Submit manuscript

Abstract

In this paper two new ways for efficient secure outsourcing the decryption of key-policy attribute-based encryption (\(KP-ABE\)) with energy efficiency are proposed. Based on an observation about the permutation property of the access structure for the attribute based encryption schemes, we propose a high efficient way for outsourcing the decryption of KP-ABE, which is suitable for being used in mobile devices. But it can only be used for the ABE schemes having tree-like access structure for the self-enclosed system. The second way is motivated from the fact that almost all the previous work on outsourcing the decryption of \(KP-ABE\) cares little about the ciphertext length. Almost all the previous schemes for secure outsourcing the decryption of ABE have linear length ciphertext with the attributes or the policy. But transferring so long ciphertexts via wireless network for mobile phone can easily run out of battery power, therefore it can not be adapted to practical application scenarios. Thus another new scheme for outsourcing the decryption of ABE but with constant-size ciphertexts is proposed. Furthermore, our second proposal gives a new efficient way for secure outsourcing the decryptor’s secret key to the cloud, which need only one modular exponentiation while all the previous schemes need many. We evaluate the efficiency of our proposals and the results show that our proposals are practical.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+
from $39.99 /Month
  • Starting from 10 chapters or articles per month
  • Access and download chapters and articles from more than 300k books and 2,500 journals
  • Cancel anytime
View plans

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

References

  • Angelo DC, Vincenz I (2011) jPBC: java pairing based cryptography. In: Proceeding of the 16th IEEE symposium on computers and communications, ISCC 2011, pp 850–855 URL: http://gas.dia.unisa.it/projects/jpbc/

  • Attrapadung N (2014) Dual system encryption via doubly selective security framework fully secure functional encryption for regular languages and more. In: Nguyen PQ, Oswald E (eds) EUROCRYPT 2014, vol 8441. Springer, LNCS, New York, pp 557–577. https://doi.org/10.1007/978-3-642-55220-5_31

    Chapter  Google Scholar 

  • Attrapadung N, Imai H (2009a) Conjunctive broadcast and attribute-based encryption. In: Shacham H, Waters B (eds) PAIRING 2009, vol 5671. Springer, LNCS, New York, pp 248–265

    Google Scholar 

  • Attrapadung N, Imai H (2009b) Dual-policy attribute based encryption. In: Abdalla M, Pointcheval D, Fouque PA, Vergnaud D (eds) ACNS 09, vol 5536. Springer, LNCS, New York, pp 168–185

    Google Scholar 

  • Attrapadung N, Libert B, de Panafieu E (2011) Expressive key-policy attribute-based encryption with constant-size ciphertexts. In: Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) (2011), pp 90–108

  • Canetti R, Garay JA (eds) (2013) CRYPTO 2013, Part II, vol 8043. Springer, LNCS, New York

    MATH  Google Scholar 

  • Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) (2011) PKC 2011, vol 6571. Springer, LNCS, New York

    Google Scholar 

  • Chase M (2007) Multi-authority attribute based encryption. In: Vadhan SP (ed) TCC 2007, vol 4392. Springer, LNCS, New York, pp 515–534

    Google Scholar 

  • Chase M, Chow SSM (2009) Improving privacy and security in multi-authority attribute-based encryption. In: Al-Shaer E, Jha S, Keromytis AD (eds) ACM CCS 09. ACM Press, New York, pp 121–130

    Chapter  Google Scholar 

  • Chen J, Wee H (2013) Fully, (almost) tightly secure IBE and dual system groups. In: Canetti R, Garay JA (eds) (2013), pp 435–460, DOI 10.1007/978-3-642-40084-1_25

  • Chen J, Wee H (2014a) Doubly spatial encryption from DBDH. Cryptology ePrint Archive, Report 2014/199, URL: http://eprint.iacr.org/2014/199

  • Chen J, Wee H (2014b) Dual system groups and its applications — compact HIBE and more. Cryptology ePrint Archive, Report 2014/265, URL: http://eprint.iacr.org/2014/265

  • Cristina D, Elena A, Catalin L, Valentin C (2014) A solution for the management of multimedia sessions in hybrid clouds. Int J Space Based Situat Comput 4(2):77–87

    Article  Google Scholar 

  • Garg S, Gentry C, Halevi S, Sahai A, Waters B (2013) Attribute-based encryption for circuits from multilinear maps. In: Canetti R, Garay JA (eds) (2013), pp 479–499, DOI 10.1007/978-3-642-40084-1_27

  • Garg S, Gentry C, Halevi S, Zhandry M (2014) Fully secure functional encryption without obfuscation. Cryptology ePrint Archive, Report 2014/666, URL: http://eprint.iacr.org/2014/666

  • Gorbunov S, Vaikuntanathan V, Wee H (2013) Attribute-based encryption for circuits. In: Boneh D, Roughgarden T, Feigenbaum J (eds) 45th ACM STOC. ACM Press, New York, pp 545–554

    Google Scholar 

  • Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A, Wright RN, Vimercati S (eds) ACM CCS 06. ACM Press, New York, pp 89–98 (available as Cryptology ePrint Archive Report 2006/309)

    Chapter  Google Scholar 

  • Green M, Hohenberger S, Waters B (2013) Outsourcing the decryption of abe ciphertexts. In: Proceedings of USENIX security symposim, San Francisco

  • Lai J, Deng RH, Guan C, Weng J (2013) Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 8(8):1343–1354

    Article  Google Scholar 

  • Lewko AB, Waters B (2011) Decentralizing attribute-based encryption. In: Paterson KG (ed) EUROCRYPT 2011, vol 6632. Springer, LNCS, New York, pp 568–588

    Chapter  Google Scholar 

  • Lewko AB, Waters B (2012) New proof methods for attribute-based encryption Achieving full security through selective techniques. In: Safavi-Naini R, Canetti R (eds) CRYPTO 2012, vol 7417. Springer, LNCS, New York, pp 180–198

    Chapter  Google Scholar 

  • Lewko AB, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert H (ed) EUROCRYPT 2010, vol 6110. Springer, LNCS, New York, pp 62–91

    Chapter  Google Scholar 

  • Li J, Huang X, Li J, Chen X, Xiang Y (2013) Securely utsourcing attribute-based encryption with checkability. IEEE Trans Parallel Distrib Syst. https://doi.org/10.1109/TPDS.2013.27

  • Meriem T, Mahmoud B, Fabrice K (2014) An approach for developing an interoperability mechanism between cloud providers. Int J Space Based Situat Comput 4(2):88–99

    Article  Google Scholar 

  • Okamoto T, Takashima K (2010) Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin T (ed) CRYPTO 2010, vol 6223. Springer, LNCS, New York, pp 191–208

    Chapter  Google Scholar 

  • Parno B, Raykova M, Vaikuntanathan V (2012) How to delegate and verify in public: verifiable computation from attribute-based encryption. In: Cramer R (ed) TCC 2012, vol 7194. Springer, LNCS, New York, pp 422–439

    Google Scholar 

  • Qin B, Deng RH, Liu S, Ma S (2015) Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans Inf Forensics Secur 10(7):1384–1393

    Article  Google Scholar 

  • Sahai A, Waters BR (2005) Fuzzy identity-based encryption. In: Cramer R (ed) EUROCRYPT 2005, vol 3494. Springer, LNCS, New York, pp 457–473

    Chapter  Google Scholar 

  • Shu G, Haixia X (2015) A secure delegation scheme of large polynomial computation in multi-party cloud. Int J Grid and Util Comput 6(2):1–7

    Google Scholar 

  • Waters B (2009) Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. In: Halevi S (ed) CRYPTO 2009, vol 5677. Springer, LNCS, New York, pp 619–636

    Chapter  Google Scholar 

  • Wang XA, Ma J, Xhafa F (2015) Outsourcing decryption of attribute based encryption with energy efficiency. In: Proceeding of the international conference on P2P, parallel, grid, cloud and internet computing 3PGCIC 2015, pp 444–448

  • Wang Y, Du J, Cheng X, Liu Z, Lin K (2016) Degradation and encryption for outsourced png images in cloud storage. Int J Grid Util Comput 7(1):22–28

    Article  Google Scholar 

  • Yamada S, Attrapadung N, Hanaoka G, Kunihiro N (2011) Generic constructions for chosen-ciphertext secure attribute based encryption. In: Catalano D, Fazio N, Gennaro R, Nicolosi A (eds) (2011), pp 71–89

  • Yamada S, Attrapadung N, Hanaoka G, Kunihiro N (2014) A framework and compact constructions for non-monotonic attribute-based encryption. In: Krawczyk H (ed) PKC 2014, vol 8383. Springer, LNCS, New York, pp 275–292. https://doi.org/10.1007/978-3-642-54631-0_16

    Google Scholar 

  • Zhu S, Yang X (2015) Protecting data in cloud environment with attribute-based encryption. Int J Grid Util Comput 6(2):91–97

    Article  Google Scholar 

Download references

Acknowledgements

The second author and fourth author are the corresponding authors. The first and second author is supported by the National Key Research and Development Program of China under Grant No. 2017YFB0802000, the National Natural Science Foundation of China under Grant Nos. 61572390, U1736111, the Natural Science Foundation of Ningbo City under Grant No. 201601HJ-B01382, and the Open Foundation of Key Laboratory of Cognitive Radio and Information Processing, Ministry of Education (Guilin University of Electronic Technology) under Grant No. CRKL160202. The fourth author is supported by the National Cryptography Development Fund of China Under Grants No. MMJJ20170112, National Key Research and Development Program of China Under Grants No. 2017YFB0802000, National Nature Science Foundation of China (Grant Nos. 61572521, 61772550, U1636114, 61402531), the Natural Science Basic Research Plan in Shaanxi Province of china (Grant Nos. 2016JQ6037) and Guangxi Key Laboratory of Cryptography and Information Security (No. GCIS201610).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Baocang Wang or Xu An Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhang, J., Wang, B., Xhafa, F. et al. Energy-efficient secure outsourcing decryption of attribute based encryption for mobile device in cloud computation. J Ambient Intell Human Comput 10, 429–438 (2019). https://doi.org/10.1007/s12652-017-0658-2

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue date:

  • DOI: https://doi.org/10.1007/s12652-017-0658-2

Keywords

Profiles

  1. Fatos Xhafa