• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing


Abstract

With the development of wireless access technologies and the popularity of mobile intelligent terminals, cloud computing is expected to expand to mobile environments. Attribute-based encryption, widely applied in cloud computing, incurs massive computational cost during the encryption and decryption phases. The computational cost grows with the complexity of the access policy. This disadvantage becomes more serious for mobile devices because they have limited resources. To address this problem, we present an efficient verifiable outsourced scheme based on the bilinear group of prime order. The scheme is called the verifiable outsourced computation ciphertext-policy attribute-based encryption scheme (VOC-CP-ABE), and it provides a way to outsource intensive computing tasks during encryption and decryption phases to CSP without revealing the private information and leaves only marginal computation to the user. At the same time, the outsourced computation can be verified by two hash functions. Then, the formal security proofs of its (selective) CPA security and verifiability are provided. Finally, we discuss the performance of the proposed scheme with comparisons to several related works.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
Z. Zhao and J. Wang, "Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing," KSII Transactions on Internet and Information Systems, vol. 11, no. 6, pp. 3254-3272, 2017. DOI: 10.3837/tiis.2017.06.024.

[ACM Style]
Zhiyuan Zhao and Jianhua Wang. 2017. Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing. KSII Transactions on Internet and Information Systems, 11, 6, (2017), 3254-3272. DOI: 10.3837/tiis.2017.06.024.

[BibTeX Style]
@article{tiis:21489, title="Verifiable Outsourced Ciphertext-Policy Attribute-Based Encryption for Mobile Cloud Computing", author="Zhiyuan Zhao and Jianhua Wang and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2017.06.024}, volume={11}, number={6}, year="2017", month={June}, pages={3254-3272}}