Next Article in Journal
Feasibility of Detecting Natural Frequencies of Hydraulic Turbines While in Operation, Using Strain Gauges
Next Article in Special Issue
Cyber and Physical Security Vulnerability Assessment for IoT-Based Smart Homes
Previous Article in Journal
A New Localization System for Indoor Service Robots in Low Luminance and Slippery Indoor Environment Using Afocal Optical Flow Sensor Based Sensor Fusion
Article Menu
Issue 1 (January) cover image

Export Article

Open AccessArticle
Sensors 2018, 18(1), 176; https://doi.org/10.3390/s18010176

Analysis of an ABE Scheme with Verifiable Outsourced Decryption

1
School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China
2
School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China
3
Institute of Information Security, Mianyang Normal University, Mianyang 621000, China
*
Author to whom correspondence should be addressed.
Received: 25 December 2017 / Revised: 5 January 2018 / Accepted: 5 January 2018 / Published: 10 January 2018
(This article belongs to the Special Issue Security in IoT Enabled Sensors)
Full-Text   |   PDF [268 KB, uploaded 10 January 2018]

Abstract

Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their “verify-then-decrypt” skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user. View Full-Text
Keywords: attribute-based encryption; outsourced decryption; verifiable; cloud computing; authorized client; wireless sensor attribute-based encryption; outsourced decryption; verifiable; cloud computing; authorized client; wireless sensor
This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).
SciFeed

Share & Cite This Article

MDPI and ACS Style

Liao, Y.; He, Y.; Li, F.; Jiang, S.; Zhou, S. Analysis of an ABE Scheme with Verifiable Outsourced Decryption. Sensors 2018, 18, 176.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Related Articles

Article Metrics

Article Access Statistics

1

Comments

[Return to top]
Sensors EISSN 1424-8220 Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top