User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption

نویسندگان

چکیده

Given the rapid development of cloud computing and storage technology, a growing number enterprises individuals use services to save data or back up data. In services, although attribute-based encryption can protect users’ security, computational cost key generation, encryption, decryption linearly increases with complexity access strategies, which becomes more critical for resource-constrained users. Therefore, this paper proposes verifiable scheme fully outsourced ciphertext policy. The simultaneously realize functions outsourcing verify correctness calculation results. This effectively reduce burden system. security verifiability are indicated proved random oracle model. experimental results show that has advantages function efficiency compared other schemes. research have theoretical practical significance.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Verifiable Attribute Based Encryption

In this paper, we propose the notion of Verifiable Attribute-Based Encryption (VABE) and give two constructs of key-policy VABE. One is with a single authority, and the other is with multi authorities. Not only our schemes are proved secure as the previous ABE schemes, they also provide a verification property. This could not be trivially solved, such as trying random decryption. Adding the ver...

متن کامل

Concrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption

As more sensitive data is shared and stored by third-party sites on the internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data is that it can be selectively shared only at a coarse-grained level. Attribute based encryption is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promisin...

متن کامل

Verifiable multi-authority attribute based encryption scheme with different permissions

In this paper, we study the traffic information granular computing theory and build traffic information fusion model, framework and implementation program based on granular computing. We raise uncertainty reduction algorithms for traffic flow prediction and congestion recognition algorithms based on granular computing theory, which will provide new ideas and methods in the complex decision maki...

متن کامل

Privacy-Aware Attribute-Based Encryption with User Accountability

As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern of user access privacy, privacy-aware ABE schemes are being developed to achieve hidden access policy recently. For the purpose of secure access control, there is, however, still one critical functionality missing in th...

متن کامل

User Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption - Full Version

Recent trend towards cloud computing paradigm, smart devices and 4G wireless technologies has enabled seamless data sharing among users. Cloud computing environment is distributed and untrusted, hence data owners have to encrypt their data to enforce data confidentiality. The data confidentiality in a distributed environment can be achieved by using attribute-based encryption technique. Decentr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2021

ISSN: ['1939-0122', '1939-0114']

DOI: https://doi.org/10.1155/2021/6617669