User Privacy Protection Scheme Based on Verifiable Outsourcing Attribute-Based Encryption
نویسندگان
چکیده
Given the rapid development of cloud computing and storage technology, a growing number enterprises individuals use services to save data or back up data. In services, although attribute-based encryption can protect users’ security, computational cost key generation, encryption, decryption linearly increases with complexity access strategies, which becomes more critical for resource-constrained users. Therefore, this paper proposes verifiable scheme fully outsourced ciphertext policy. The simultaneously realize functions outsourcing verify correctness calculation results. This effectively reduce burden system. security verifiability are indicated proved random oracle model. experimental results show that has advantages function efficiency compared other schemes. research have theoretical practical significance.
منابع مشابه
Verifiable Attribute Based Encryption
In this paper, we propose the notion of Verifiable Attribute-Based Encryption (VABE) and give two constructs of key-policy VABE. One is with a single authority, and the other is with multi authorities. Not only our schemes are proved secure as the previous ABE schemes, they also provide a verification property. This could not be trivially solved, such as trying random decryption. Adding the ver...
متن کاملConcrete Attribute-Based Encryption Scheme with Verifiable Outsourced Decryption
As more sensitive data is shared and stored by third-party sites on the internet, there will be a need to encrypt data stored at these sites. One drawback of encrypting data is that it can be selectively shared only at a coarse-grained level. Attribute based encryption is a public-key-based one-to-many encryption that allows users to encrypt and decrypt data based on user attributes. A promisin...
متن کاملVerifiable multi-authority attribute based encryption scheme with different permissions
In this paper, we study the traffic information granular computing theory and build traffic information fusion model, framework and implementation program based on granular computing. We raise uncertainty reduction algorithms for traffic flow prediction and congestion recognition algorithms based on granular computing theory, which will provide new ideas and methods in the complex decision maki...
متن کاملPrivacy-Aware Attribute-Based Encryption with User Accountability
As a new public key primitive, attribute-based encryption (ABE) is envisioned to be a promising tool for implementing fine-grained access control. To further address the concern of user access privacy, privacy-aware ABE schemes are being developed to achieve hidden access policy recently. For the purpose of secure access control, there is, however, still one critical functionality missing in th...
متن کاملUser Collusion Avoidance Scheme for Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption - Full Version
Recent trend towards cloud computing paradigm, smart devices and 4G wireless technologies has enabled seamless data sharing among users. Cloud computing environment is distributed and untrusted, hence data owners have to encrypt their data to enforce data confidentiality. The data confidentiality in a distributed environment can be achieved by using attribute-based encryption technique. Decentr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2021
ISSN: ['1939-0122', '1939-0114']
DOI: https://doi.org/10.1155/2021/6617669