• KSII Transactions on Internet and Information Systems
    Monthly Online Journal (eISSN: 1976-7277)

Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing


Abstract

Mobile cloud computing is a very attractive service paradigm that outsources users' data computing and storage from mobile devices to cloud data centers. To protect data privacy, users often encrypt their data to ensure data sharing securely before data outsourcing. However, the bilinear and power operations involved in the encryption and decryption computation make it impossible for mobile devices with weak computational power and network transmission capability to correctly obtain decryption results. To this end, this paper proposes an outsourcing decryption algorithm of verifiable transformed ciphertext. First, the algorithm uses the key blinding technique to divide the user's private key into two parts, i.e., the authorization key and the decryption secret key. Then, the cloud data center performs the outsourcing decryption operation of the encrypted data to achieve partial decryption of the encrypted data after obtaining the authorization key and the user's outsourced decryption request. The verifiable random function is used to prevent the semi-trusted cloud data center from not performing the outsourcing decryption operation as required so that the verifiability of the outsourcing decryption is satisfied. Finally, the algorithm uses the authorization period to control the final decryption of the authorized user. Theoretical and experimental analyses show that the proposed algorithm reduces the computational overhead of ciphertext decryption while ensuring the verifiability of outsourcing decryption.


Statistics

Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2015)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article

[IEEE Style]
G. Xu, C. Wang, S. Li, X. Shi, X. Luo, Y. Gan, "Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing," KSII Transactions on Internet and Information Systems, vol. 18, no. 4, pp. 998-1019, 2024. DOI: 10.3837/tiis.2024.04.010.

[ACM Style]
Guangwei Xu, Chen Wang, Shan Li, Xiujin Shi, Xin Luo, and Yanglan Gan. 2024. Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing. KSII Transactions on Internet and Information Systems, 18, 4, (2024), 998-1019. DOI: 10.3837/tiis.2024.04.010.

[BibTeX Style]
@article{tiis:90795, title="Outsourcing decryption algorithm of Verifiable transformed ciphertext for data sharing", author="Guangwei Xu and Chen Wang and Shan Li and Xiujin Shi and Xin Luo and Yanglan Gan and ", journal="KSII Transactions on Internet and Information Systems", DOI={10.3837/tiis.2024.04.010}, volume={18}, number={4}, year="2024", month={April}, pages={998-1019}}