TY - GEN
T1 - Chosen ciphertext secure attribute-based encryption with outsourced decryption
AU - Zuo, Cong
AU - Shao, Jun
AU - Wei, Guiyi
AU - Xie, Mande
AU - Ji, Min
N1 - Publisher Copyright:
© Springer International Publishing Switzerland 2016.
PY - 2016
Y1 - 2016
N2 - Although attribute-based encryption (ABE) is a useful cryptographic tool to realize expressive access policy on ciphertexts, it is not quite suitable for mobile devices. The root cause lies in that the size of the ciphertext and the decryption cost are usually proportional to the complexity of the access policy. To solve this problem, a variant of ABE, named attribute-based encryption with outsourced decryption (OD-ABE), was proposed by Green, Hohenberger and Waters. Especially, OD-ABE allows a proxy with a transformation key delegated from the user to simplify ABE ciphertexts satisfied by the user’s attributes. On the other hand, this transformation also makes it tricky to design an OD-ABE scheme achieving the CCA security that is generally considered as the standard notion of security for a cryptosystem. However, the existing OD-ABE schemes only achieve the re-randomizable (replayable) CCA security. In this paper, we propose the CCA security model for ODABE and a concrete scheme secure in our proposed security model. We believe that this improvement on the security of OD-ABE will lead to a wider spectrum of applications.
AB - Although attribute-based encryption (ABE) is a useful cryptographic tool to realize expressive access policy on ciphertexts, it is not quite suitable for mobile devices. The root cause lies in that the size of the ciphertext and the decryption cost are usually proportional to the complexity of the access policy. To solve this problem, a variant of ABE, named attribute-based encryption with outsourced decryption (OD-ABE), was proposed by Green, Hohenberger and Waters. Especially, OD-ABE allows a proxy with a transformation key delegated from the user to simplify ABE ciphertexts satisfied by the user’s attributes. On the other hand, this transformation also makes it tricky to design an OD-ABE scheme achieving the CCA security that is generally considered as the standard notion of security for a cryptosystem. However, the existing OD-ABE schemes only achieve the re-randomizable (replayable) CCA security. In this paper, we propose the CCA security model for ODABE and a concrete scheme secure in our proposed security model. We believe that this improvement on the security of OD-ABE will lead to a wider spectrum of applications.
KW - Attribute-based encryption
KW - Chosen ciphertext security
KW - Outsourced decryption
KW - Random oracle model
UR - http://www.scopus.com/inward/record.url?scp=84978287530&partnerID=8YFLogxK
U2 - 10.1007/978-3-319-40253-6_30
DO - 10.1007/978-3-319-40253-6_30
M3 - Conference contribution
AN - SCOPUS:84978287530
SN - 9783319402529
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 495
EP - 508
BT - Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Proceedings
A2 - Liu, Joseph K.
A2 - Steinfeld, Ron
PB - Springer Verlag
T2 - 21st Australasian Conference on Information Security and Privacy, ACISP 2016
Y2 - 4 July 2016 through 6 July 2016
ER -