Attribute-based encryption with outsourced decryption in blockchain

  • PDF / 1,618,855 Bytes
  • 13 Pages / 595.224 x 790.955 pts Page_size
  • 77 Downloads / 192 Views

DOWNLOAD

REPORT


Attribute-based encryption with outsourced decryption in blockchain Hui Zheng1 · Jun Shao1 · Guiyi Wei1 Received: 27 January 2020 / Accepted: 14 April 2020 © Springer Science+Business Media, LLC, part of Springer Nature 2020

Abstract Attribute-based encryption (ABE) is a powerful cryptographic primitive for access control and fine-grained sharing on encrypted data. Due to this functionality, ABE is usually adopted in encrypted cloud storage for flexible data sharing. However, the main drawback of ABE is that the computational cost grows linearly with the complexity of the access policy. One of the promising solutions for the problem is to outsource computation securely. For example, the user can outsource most of the decryption cost to a proxy, while the underlying plaintext remains confidential. Nonetheless, all the existing ABE schemes with outsourced decryption ignore the fairness between the user and the proxy, i.e., the user may refuse to pay even if he/she obtain the valid result. To address this problem, in this paper we propose a new ABE scheme with fair outsourced decryption by using blockchain and sampling technique. In particular, we make use of the smart contract in blockchain to guarantee that the proxy can always get the reward with the valid outsourced decryption result. Furthermore, we apply the sampling technique to enable the miners in blockchain to check the validity of the outsourced decryption result. The detailed analysis conducts that our proposal is secure and fair under some reasonable assumptions, and the experimental results demonstrate that our proposal is efficient. At last, it may be of independent interest that our proposal is a generic construction for pairing-based ABE schemes. Keywords ABE · Outsourced computation · Blockchain · Fairness

1 Introduction With the burgeoning of information technology, vast information is generated each day, and it isn’t effortless for individuals to store these data locally. Cloud storage is considered as the most economical method to solve this problem [36]. However, in reality, there is some sensitive information to be uploaded, and the cloud servers are not This work extends the paper that was published at NSS 2019 (Zheng, et al. [38])  Jun Shao

[email protected] Hui Zheng [email protected] Guiyi Wei [email protected] 1

Zhejiang Gongshang University, No. 18 Xuezheng Street, Qiantang New District, Hangzhou, Zhejiang Province, 310018, People’s Republic of China

always trusted. Hence, to protect the privacy of the user, uploading the encrypted data to the cloud is a promising solution. Nevertheless, traditional encryption schemes are not suitable for flexible data sharing or fine-grained access control, so a new cryptographic primitive named attributebased encryption (ABE) was put forth by Sahai and Waters [32]. In such a scheme, only the one whose attribute set satisfies the access policy has the right key to decrypt the corresponding ciphertext. Since then, many ABE schemes with different properties have been proposed [9, 12, 15, 19, 21,