TY - GEN
T1 - Practical and efficient attribute-based encryption with constant-size ciphertexts in outsourced verifiable computation
AU - Zhang, Kai
AU - Gong, Junqing
AU - Tang, Shaohua
AU - Chen, Jie
AU - Li, Xiangxue
AU - Qian, Haifeng
AU - Cao, Zhenfu
N1 - Publisher Copyright:
© 2016 ACM.
PY - 2016/5/30
Y1 - 2016/5/30
N2 - In cloud computing, computationally weak users are always willing to outsource costly computations to a cloud, and at the same time they need to check the correctness of the result provided by the cloud. Such activities motivate the occurrence of verifiable computation (VC). Recently, Parno, Raykova and Vaikuntanathan showed any VC protocol can be constructed from an attribute-based encryption (ABE) scheme for a same class of functions. In this paper, we propose two practical and efficient semi-adaptively secure keypolicy attribute-based encryption (KP-ABE) schemes with constant-size ciphertexts. The semi-adaptive security requires that the adversary designates the challenge attribute set after it receives public parameters but before it issues any secret key query, which is stronger than selective security guarantee. Our first construction deals with small universe while the second one supports large universe. Both constructions employ the technique underlying the prime-order instantiation of nested dual system groups, which are based on the d-linear assumption including SXDH and DLIN assumptions. In order to evaluate the performance, we implement our ABE schemes using Python language in Charm. Compared with previous KP-ABE schemes with constant-size ciphertexts, our constructions achieve shorter ciphertext and secret key sizes, and require low computation costs, especially under the SXDH assumption.
AB - In cloud computing, computationally weak users are always willing to outsource costly computations to a cloud, and at the same time they need to check the correctness of the result provided by the cloud. Such activities motivate the occurrence of verifiable computation (VC). Recently, Parno, Raykova and Vaikuntanathan showed any VC protocol can be constructed from an attribute-based encryption (ABE) scheme for a same class of functions. In this paper, we propose two practical and efficient semi-adaptively secure keypolicy attribute-based encryption (KP-ABE) schemes with constant-size ciphertexts. The semi-adaptive security requires that the adversary designates the challenge attribute set after it receives public parameters but before it issues any secret key query, which is stronger than selective security guarantee. Our first construction deals with small universe while the second one supports large universe. Both constructions employ the technique underlying the prime-order instantiation of nested dual system groups, which are based on the d-linear assumption including SXDH and DLIN assumptions. In order to evaluate the performance, we implement our ABE schemes using Python language in Charm. Compared with previous KP-ABE schemes with constant-size ciphertexts, our constructions achieve shorter ciphertext and secret key sizes, and require low computation costs, especially under the SXDH assumption.
KW - Attributebased encryption
KW - Charm
KW - Dual system encryption
KW - Outsourced computation
KW - Verifiable computation
UR - https://www.scopus.com/pages/publications/84979650153
U2 - 10.1145/2897845.2897858
DO - 10.1145/2897845.2897858
M3 - 会议稿件
AN - SCOPUS:84979650153
T3 - ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security
SP - 269
EP - 279
BT - ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security
PB - Association for Computing Machinery, Inc
T2 - 11th ACM Asia Conference on Computer and Communications Security, ASIA CCS 2016
Y2 - 30 May 2016 through 3 June 2016
ER -