POSTER: Ciphertext-policy attribute-based encryption method with secure decryption key generation and outsourcing decryption of ABE ciphertexts | |
Fang, Yuejian ; Wen, Zilong ; Shen, Qingni ; Yang, Yahui ; Wu, Zhonghai | |
2015 | |
英文摘要 | Attribute-based encryption (ABE) allows user to encrypt and decrypt data based on user attributes, and can be applied in some promising area such as mobile cloud storage. Since these are massive users in these applications, secure online transmission of decryption key is necessary. In this paper, a ciphertext- policy attribute-based encryption (CP-ABE) method with secure decryption key generation and outsourcing decryption of ABE ciphertexts is proposed. In the method, a user’s public key information is embedded into his decryption key in the key generation algorithm. Both the user’s decryption key and private key are needed to decrypt a ciphertext. With only the decryption key, a ciphertext cannot be decrypted, so the decryption key is secure and can be directly transmitted online. This saves some costs comparing to other transmission approaches, such as Secure Sockets Layer (SSL). Furthermore, the method supports outsourcing the decryption of ABE ciphertexts. Our analysis and experiment results prove that our method is more efficient than the existing outsourcing methods which generally use key transformation technique. ? Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2015.; EI; 585-589; 164 |
语种 | 英语 |
出处 | 11th International Conference Security and Privacy in Communication Networks, SecureComm 2015 |
DOI标识 | 10.1007/978-3-319-28865-9_36 |
内容类型 | 其他 |
源URL | [http://ir.pku.edu.cn/handle/20.500.11897/436934] |
专题 | 软件与微电子学院 |
推荐引用方式 GB/T 7714 | Fang, Yuejian,Wen, Zilong,Shen, Qingni,et al. POSTER: Ciphertext-policy attribute-based encryption method with secure decryption key generation and outsourcing decryption of ABE ciphertexts. 2015-01-01. |
个性服务 |
查看访问统计 |
相关权益政策 |
暂无数据 |
收藏/分享 |
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论