Privacy-preserving online/offline and outsourced multi-authority attribute-based encryption

Attribute based encryption(ABE) is an efficient technique that exploits attributes and access policies to achieve fine grained access control in cloud computing. Besides, outspread ABE schemes with multiple authorities(multi-authority ABE) are more suitable for practical applications than basic sing...

Full description

Saved in:
Bibliographic Details
Published in:2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS) pp. 285 - 291
Main Authors: Jiaye Shao, Yanqin Zhu, Qijin Ji
Format: Conference Proceeding
Language:English
Published: IEEE 01-05-2017
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Attribute based encryption(ABE) is an efficient technique that exploits attributes and access policies to achieve fine grained access control in cloud computing. Besides, outspread ABE schemes with multiple authorities(multi-authority ABE) are more suitable for practical applications than basic single authority ABE schemes. Nevertheless, existing multi-authority ABE schemes either can't preserve access policies' privacy or sustain expensive computational cost of encryption and decryption phases. In this paper, to tackle the above challenges, we propose an online/offline and outsourced multi-authority ABE scheme with policy protection. Roughly speaking, our main idea is to alleviate the online computation overhead for owners by splitting the encryption algorithm to the online encryption and offline encryption. During the decryption phase, users outsource massive decryption operations to the proxy server via the technique of transformation key. We can demonstrate that our scheme is secure and also protects the privacy of access policies according to security analysis. Furthermore, performance analysis shows that our scheme can lighten the computation burden for both owners and users and is quite appropriate for resource-limited devices in the multi-authority systems.
DOI:10.1109/ICIS.2017.7960007