Security and Privacy in Communication Networks. 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers

Research Article

POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts

Download
312 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-28865-9_36,
        author={Yuejian Fang and Zilong Wen and Qingni Shen and Yahui Yang and Zhonghai Wu},
        title={POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts},
        proceedings={Security and Privacy in Communication Networks. 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers},
        proceedings_a={SECURECOMM},
        year={2016},
        month={2},
        keywords={CP-ABE Secure decryption key generation Outsourcing Mobile cloud storage},
        doi={10.1007/978-3-319-28865-9_36}
    }
    
  • Yuejian Fang
    Zilong Wen
    Qingni Shen
    Yahui Yang
    Zhonghai Wu
    Year: 2016
    POSTER: Ciphertext-Policy Attribute-Based Encryption Method with Secure Decryption Key Generation and Outsourcing Decryption of ABE Ciphertexts
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-28865-9_36
Yuejian Fang1,*, Zilong Wen1,*, Qingni Shen1,*, Yahui Yang1,*, Zhonghai Wu1,*
  • 1: Peking University
*Contact email: fangyj@ss.pku.edu.cn, zlwen@pku.edu.cn, qingnishen@ss.pku.edu.cn, yhyang@ss.pku.edu.cn, wuzh@pku.edu.cn

Abstract

Attribute-based encryption (ABE) allows user to encrypt and decrypt data based on user attributes, and can be applied in some promising area such as mobile cloud storage. Since these are massive users in these applications, secure online transmission of decryption key is necessary. In this paper, a ciphertext-policy attribute-based encryption (CP-ABE) method with secure decryption key generation and outsourcing decryption of ABE ciphertexts is proposed. In the method, a user’s public key information is embedded into his decryption key in the key generation algorithm. Both the user’s decryption key and private key are needed to decrypt a ciphertext. With only the decryption key, a ciphertext cannot be decrypted, so the decryption key is secure and can be directly transmitted online. This saves some costs comparing to other transmission approaches, such as Secure Sockets Layer (SSL). Furthermore, the method supports outsourcing the decryption of ABE ciphertexts. Our analysis and experiment results prove that our method is more efficient than the existing outsourcing methods which generally use key transformation technique.