3,033 Hits in 4.9 sec

Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption

Baodong Qin, Robert H. Deng, Shengli Liu, Siqi Ma
2015 IEEE Transactions on Information Forensics and Security  
Attribute-based encryption (ABE) with outsourced decryption not only enables fine-grained sharing of encrypted data, but also overcomes the efficiency drawback (in terms of ciphertext size and decryption  ...  In this paper, we first formalize a security model of ABE with verifiable outsourced decryption by introducing a verification key in the output of the encryption algorithm.  ...  Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption data confidential and enforce access control policies correctly.  ... 
doi:10.1109/tifs.2015.2410137 fatcat:sbilsv3xvraq5inh5qsr4tu2pu

Enhancing the Efficiency of Key Management Protocol in Attribute based Encryption for Cloud Data Sharing

Priya Chaturvedi
2019 International Journal for Research in Applied Science and Engineering Technology  
Hence, we proposed a new and improvised method that is ABE with Verifiable Outsourced Decryption with KEM(key encapsulation mechanisms). ABE scheme was proposed by Sahai and Waters in 2005 year.  ...  ABE is the mechanism in which users are allowed to encrypt and decrypt data based on the attributes provided by the user.  ...  The formal definition of attribute-based KEM with outsourced decryption is exactly the same as that of ABE with outsourced decryption, except that the encryption algorithm of ABE is replaced by an encapsulation  ... 
doi:10.22214/ijraset.2019.6154 fatcat:6adyu2c2zvcsncxkk3tza2r45e

Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption [article]

Charan Kumar, Dinesh Kumar, Arun Kumar Reddy
2014 arXiv   pre-print
Attribute based encryption is a public-key-based one-to-many encryption that allows users to encrypt and decry pt data based on user attributes.  ...  One.One of the main efficiency drawbacks of the existing ABE schemes is that decryption involves expensive pairing operations and the number of such operations grows with the complexity of the access policy  ...  Conclusion: In this paper we considered a new requirement of ABE with outsourced decryption: efficiency, verifiability.  ... 
arXiv:1407.3660v1 fatcat:gcdrnkhkzbao3o5544exvkdmxe

An Attribute-Based Encryption Method Using Outsourced Decryption and Hierarchical Access Structure

Tabassum N. Mujawar, Lokesh B. Bhajantri
2022 Journal of Telecommunications and Information Technology  
Ciphertext policy-based attribute-based encryption (CPABE) is one of the most widely used methods for providing encrypted access control.  ...  This paper presents an efficient method consisting in outsourcing decryption operations to a third-party server, so that complex operations may be performed by that machine with only some simple calculations  ...  An efficient outsourced ABE scheme with verifiability of transformation based on the key encapsulation mechanism is proposed in [6] .  ... 
doi:10.26636/jtit.2022.158421 fatcat:danevprqbngovohcltsrgrweee

Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing

2017 KSII Transactions on Internet and Information Systems  
Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases.  ...  The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption  ...  [16] proposed securely outsourced attribute-based encryption with checkability, which supports both outsourced key issuing and decryption.  ... 
doi:10.3837/tiis.2017.06.024 fatcat:h3ex5kn5afeatb25gm6tf4lzca

A Study on CP-ABE-based Medical Data Sharing System with Key Abuse Prevention and Verifiable Outsourcing in the IoMT Environment

Yong-Woon Hwang, Im-Yeong Lee
2020 Sensors  
This paper focuses on the IoMT environment for a study of a CP-ABE-based medical data sharing system with key abuse prevention and verifiable outsourcing in a cloud environment.  ...  Many studies have been conducted on access control techniques using ciphertext-policy attribute-based encryption (CP-ABE), a form of attribute-based encryption, among various security technologies and  ...  Figure 2 . 2 Attribute-Based Encryption (Left ciphertext-policy attribute-based encryption (CP-ABE), Right key-policy attribute-based encryption (KP-ABE)).  ... 
doi:10.3390/s20174934 pmid:32878202 pmcid:PMC7506716 fatcat:zuqhdxs2eveepntqo7h6gojeea


M. Amsaveni
2018 International Journal of Advanced Research in Computer Science  
Even obtaining encryption key and decryption key, attacker will not help in decrypting the ciphertext.  ...  Through extensive analysis on different fine grained access control mechanism on the outsourced data, the ensemble operator model can gain significant performance to highlight the scalability and efficiency  ...  Attribute based encryption with efficient verifiable outsourced decryption In this literature, Fine grained access control is enabled in terms of attribute-based encryption (ABE) in order to prevent the  ... 
doi:10.26483/ijarcs.v9i3.6118 fatcat:5cg7ewgzbjemtdaojlsr7mm75e

User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption

Luo Sheng, Vincenzo Conti
2021 Security and Communication Networks  
Therefore, this paper proposes a verifiable attribute-based encryption scheme for a fully outsourced ciphertext policy.  ...  In the cloud storage services, although attribute-based encryption can protect users' data security, the computational cost of key generation, data encryption, and data decryption linearly increases with  ...  Attribute-based encryption usually cooperates with symmetric encryption to encrypt plaintext data, that is, encrypt plaintext with the symmetric key, and then encapsulates the symmetric key with attribute-based  ... 
doi:10.1155/2021/6617669 fatcat:vvhhvawodraaned2pzykve5quq

Secure Data Sharing with Lightweight Computation in E-Health

Leyou Zhang, Xuehuang Gao, Yi Mu.
2020 IEEE Access  
INDEX TERMS edge computing, attribute-based encryption, modular exponentiation, outsourcing calculation verifiability.  ...  The proposed Mask Algorithm along with blind pairs conceals the bases and exponents of the encrypted data, thus preserving the privacy of sensitive data in the process of outsourced computing.  ...  [5] presented a more efficient and universal ABE structure with verifiable outsourcing decryption is proposed.  ... 
doi:10.1109/access.2020.3039866 fatcat:fwe3x3koyjdndpgk3q4mj5oejy

An Efficient Encryption Scheme with Verifiable Outsourced Decryption in Mobile Cloud Computing [article]

Jing Li, Zhitao Guan, Xiaojiang Du, Zijian Zhang, Jun Wu
2018 arXiv   pre-print
To further reduce the decryption overhead on data receivers, we additionally propose a verifiable outsourced decryption scheme.  ...  A promising public key encryption scheme, Attribute-Based Encryption (ABE), especially the Ciphertext Policy Attribute-Based Encryption (CP-ABE), has been used for realizing fine-grained access control  ...  Compared with this scheme, Lin et al [15] proposed a more efficient construction ABE with verifiable outsourced decryption, which reduced the bandwidth and the computation costs almost by half.  ... 
arXiv:1810.10750v1 fatcat:y264ga5ctrehfnrq7ytkwvjf2e

Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption

Kai Zhang, Jianfeng Ma, Jiajia Liu, Hui Li
2016 Science China Information Sciences  
Adaptively secure multi-authority attribute-based encryption with verifiable outsourced decryption. Sci China Inf Sci, 2016, 59(9): 099105,  ...  The responsibility for scientific accuracy and content remains entirely with the authors.  ...  Dear editor, Attribute-based encryption (ABE) was first introduced by Sahai and Waters [1] where the decryption ability of a user is based on his attributes.  ... 
doi:10.1007/s11432-016-0012-9 fatcat:vkjxqglpnjgoljw3ynvius7ezy

Attribute-Based Encryption With Verifiable Outsourced Decryption

Junzuo Lai, Robert H. Deng, Chaowen Guan, Jian Weng
2013 IEEE Transactions on Information Forensics and Security  
Attribute-based encryption with verifiable outsourced decryption. (2013).  ...  Index Terms-Attribute-based encryption, outsourced decryption, verifiability.  ...  To assess the performance of our ABE scheme with verifiable outsourced decryption, we implement the CP-ABE scheme with verifiable outsourced decryption and conduct experiments on both an ARM-based mobile  ... 
doi:10.1109/tifs.2013.2271848 fatcat:5f5dflg5qvahfix2zqgp5dfc5y

Reliable Bulk-Data Dissemination in Delay Tolerant Networks

Deze Zeng, Song Guo, Jiankun Hu
2014 IEEE Transactions on Parallel and Distributed Systems  
Attribute-Based Encryption (ABE) is a promising cryptographic primitive which significantly enhances the versatility of access control mechanisms.  ...  In addition, for the first time, we propose an outsourced ABE construction which provides checkability of the outsourced computation results in an efficient way.  ...  Private key associated with access structure that control which cipher text a user is able to decrypt. We are using attribute-based encryption (ABE) as the main encryption primitive.  ... 
doi:10.1109/tpds.2013.221 fatcat:t5f5xpdauvektdc6wtmdgvlhqa

Key Aggregate Cryptosystem for Group Sharing Data on Cloud Storage

Ashwini Patil, Lathashree Chintakindi, Prof. Rajana Kedar, Amrutamasal A, Pritam Shinde
2016 IJARCCE  
This paper generally tend to expose the way to firmly, expeditiously, and flexibly proportion understanding with others in cloud garage.  ...  This compact combination key can be handily sent to others or be preserve on terribly revolving credit with very limited comfy storage.  ...  The on pinnacle of statement motivates unitedstates to check ABE (Attribute-Based Encryption) with verifiable outsourced coding at some stage in this thesis work.  ... 
doi:10.17148/ijarcce.2016.51254 fatcat:i3rimesd6ba3fj5z4g2zj27xsm

Privacy Preservation for eHealth Big Data in Cloud Accessed Using Resource-Constrained Devices: Survey

Kittur P. Kibiwott, Fengli Zhang, Kimeli Victor K., Anyembe Andrew Omala, Eugene Opoku-Mensah
2019 International Journal of Network Security  
In order to overcome these challenges associated with security and privacy, the data owner (hospital) encrypts data using Attribute Based Encryption (ABE) primitive due to the fine-grained access control  ...  In this paper, a survey of ABE with outsourced decryption of the existing works that is applicable to resource-constrained device for accessing eHealth big data is provided.  ...  [39] proposed a new CP-ABE scheme known as Offline/online attribute-based encryption with verifiable outsourced decryption protocol.  ... 
dblp:journals/ijnsec/KibiwottZKOO19 fatcat:m7t27irx6ja4rlkxa7vazvxu5q
« Previous Showing results 1 — 15 out of 3,033 results