Skip to main navigation Skip to search Skip to main content

Outsourced KP-ABE with enhanced security

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Although Key-Policy Attribute-Based Encryption (KP-ABE) has been widely applied to protect data in cloud computing, it is always criticized for its inefficiency drawbacks, coming from both key- issuing and decryption. Recently, some papers proposed the outsourcing solutions. But adversaries in the attack model of these researches were divided into two categories, and it is assumed that the two cannot communicate with each other, which is obviously unrealistic. In this paper, we first proved that there are severe security vulnerabilities in these schemes for this assumption, and then proposed a security enhanced Chosen Plain- text Attack (SE-CPA) model, which eliminates the improper limitations. By utilizing Proxy Re-Encryption (PRE), we also constructed a concrete KP-ABE Outsourcing scheme (O-KP-ABE) and proved its security under SE-CPA model. Comparisons with existing schemes show that our construction has comprehensive advantages in security and efficiency.

Original languageEnglish
Title of host publicationTrusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers
EditorsMoti Yung, Liehuang Zhu, Yanjiang Yang
PublisherSpringer Verlag
Pages36-50
Number of pages15
ISBN (Print)9783319279978
DOIs
StatePublished - 2015
Event6th International Conference on Trusted Systems, INTRUST 2014 - Beijing, China
Duration: 16 Dec 201417 Dec 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume9473
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference6th International Conference on Trusted Systems, INTRUST 2014
Country/TerritoryChina
CityBeijing
Period16/12/1417/12/14

Keywords

  • Attack model
  • Cloud computing
  • Computation outsourcing
  • KP-ABE
  • Proxy re-encryption

Fingerprint

Dive into the research topics of 'Outsourced KP-ABE with enhanced security'. Together they form a unique fingerprint.

Cite this