JIN Yun-xia1, YANG He-kun1, FENG Chao-sheng1,2, LIU Shuai-nan1, LI Hang1, ZOU Li-ping1, WAN Guo-gen3
1. College of Computer Science, Sichuan Normal University, Chengdu, Sichuan 610101, China;
2. Network and Data Security Key Laboratory of Sichuan Province, University of Electronic Science and Technology of China, Chengdu, Sichuan 610054, China;
3. School of Cyber Security, Chengdu University of Information Technology, Chengdu, Sichuan 610225, China
Abstract:For most of the existing key-policy attribute-based encryption schemes,there are some problems in the decryption,such as the high cost of the client computing,long decryption time and high resource consumption.Some schemes propose outsourcing decryption to cloud servers.However,these schemes do not give the specific parallelization method of outsourcing decryption in cloud server,and there are problems of low efficiency of cloud decryption.To solve these problems,this paper presents a KP-ABE scheme for decryption outsourcing.In this scheme,most of decryption computation is outsourced to Spark platform;and according to the decryption characteristics of KP-ABE,a decryption parallelization algorithm is designed to complete the parallel decryption of leaf nodes and root nodes.The performance analysis shows that most of decryption computing is done by cloud servers and the client can decrypt the shared data by shared access tree with only once exponential operation,and the parallel design can effectively improve the cloud decryption rate.
晋云霞, 杨贺昆, 冯朝胜, 刘帅南, 李航, 邹莉萍, 万国根. 一种支持解密外包的KP-ABE方案[J]. 电子学报, 2020, 48(3): 561-567.
JIN Yun-xia, YANG He-kun, FENG Chao-sheng, LIU Shuai-nan, LI Hang, ZOU Li-ping, WAN Guo-gen. A KP-ABE Scheme with Outsourced Decryption. Acta Electronica Sinica, 2020, 48(3): 561-567.
[1] 冯朝胜,秦志光,袁丁.云数据安全存储技术[J].计算机学报,2015,38(1):150-163. FENG Chao-sheng,QIN Zhi-guang,et al.Technigues of secure storage for cloud data[J].Chinese Journal of Computers,2015,38(1):150-163.(in Chinese)
[2] 冯朝胜,秦志光,袁丁,等.云计算环境下访问控制关键技术[J].电子学报,2015,43(2):312-319 FENG Chao-sheng,QIN Zhi-guang,et al.Key techniques of access control for cloud computing[J].Acta Electronica Sinica,2015,43(2):312-319.(in Chinese)
[3] Sahai A,Waters B R.Fuzzy identity-based encryption[A].Ronald Cramer.Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques[C].Berlin:Springer,2004.457-473.
[4] Bethencourt J,Sahai A,Waters B.Ciphertext-policy attribute-based encryption[A].IEEE Symposium on Security and Privacy[C].Washington:IEEE Computer Society,2007. 321-334.
[5] Goyal V,Pandey O,Sahai A,et al.Attribute-based encryption for fine-grained access control of encrypted data[A].Computer and Communications Security[C].New York:ACM,2006.89-98.
[6] Green M,Hohenberger S,Waters B,et al.Outsourcing the decryption of ABE ciphertexts[A].Usenix Security Symposium[C].Berkeley:Usenix Association,2011. 34-34.
[7] Yu S,Wang C,Ren K,et al.Achieving secure,scalable,and fine-grained data access control in cloud computing[A]. International Conference on Computer Communications[C].Berlin,Heidelberg:Springer,2010.534-542.
[8] Attrapadung N,Herranz J,Laguillaumie F,et al.Attribute-based encryption schemes with constant-size ciphertexts[J].Theoretical Computer Science,2012,422:15-38.
[9] Hohenberger S,Waters B.Attribute-based Encryption with Fast Decryption[M].Berlin,Heidelberg:Springer,2013.162-173.
[10] Lai J,Deng R H,Li Y,et al.Fully secure key-policy attribute-based encryption with constant-size ciphertexts and fast decryption[A].ACM Symposium on Information[C].New York:ACM,2014.239-248.
[11] Lin S,Zhang R,Ma H,et al.Revisiting attribute-based encryption with verifiable outsourced decryption[J].IEEE Transactions on Information Forensics and Security,2015,10(10):2119-2130.
[12] Rahulamathavan Y,Veluru S,Han J,et al.User collusion avoidance scheme for privacy-preserving decentralized key-policy attribute-based encryption[J].IEEE Transactions on Computers,2016,65(9):2939-2946.
[13] Liu Z,Jiang Z L,Wang X,et al.Offline/online attribute-based encryption with verifiable outsourced decryption[J].Concurrency and Computation:Practice and Experience,2017,29(7):1532-0626