@inproceedings{46374eabc99d4e52859724b3c12d9cbc,
title = "Outsourced KP-ABE with enhanced security",
abstract = "Although Key-Policy Attribute-Based Encryption (KP-ABE) has been widely applied to protect data in cloud computing, it is always criticized for its inefficiency drawbacks, coming from both key- issuing and decryption. Recently, some papers proposed the outsourcing solutions. But adversaries in the attack model of these researches were divided into two categories, and it is assumed that the two cannot communicate with each other, which is obviously unrealistic. In this paper, we first proved that there are severe security vulnerabilities in these schemes for this assumption, and then proposed a security enhanced Chosen Plain- text Attack (SE-CPA) model, which eliminates the improper limitations. By utilizing Proxy Re-Encryption (PRE), we also constructed a concrete KP-ABE Outsourcing scheme (O-KP-ABE) and proved its security under SE-CPA model. Comparisons with existing schemes show that our construction has comprehensive advantages in security and efficiency.",
keywords = "Attack model, Cloud computing, Computation outsourcing, KP-ABE, Proxy re-encryption",
author = "Chao Li and Bo Lang and Jinmiao Wang",
note = "Publisher Copyright: {\textcopyright} Springer International Publishing Switzerland 2015.; 6th International Conference on Trusted Systems, INTRUST 2014 ; Conference date: 16-12-2014 Through 17-12-2014",
year = "2015",
doi = "10.1007/978-3-319-27998-5\_3",
language = "英语",
isbn = "9783319279978",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "36--50",
editor = "Moti Yung and Liehuang Zhu and Yanjiang Yang",
booktitle = "Trusted Systems - 6th International Conference, INTRUST 2014, Revised Selected Papers",
address = "德国",
}