Abstract
Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their “verify-then-decrypt” skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user.
  1. Introduction
Recently, cloud computing has become a very fascinating computing paradigm, in which storage and computation have moved away from terminal devices to the remote side. There are many novel applications in this area, such as outsourcing computation [,] and outsourcing verification []. This new and popular method brings important revolutions for the management, distribution and sharing data of enterprises and individuals, especially for some constrained devices, such as mobile phone, wireless sensors. Cloud clients (or sensors) are able to achieve significant cost savings by outsourcing their data storage and computation to some cloud service providers. Since the data of cloud clients (or sensors) are out of control by themselves, how to ensure the data security of cloud clients (sensors) is a significant problem in academia and industrial. Utilizing all kinds of cryptographic schemes is an essential method to achieve this goal. While attribute-based encryption (ABE) [] is one of the most popular notions to study and utilize in cloud computing since it has the property of the flexible and fine-grained access control.
The notion of ABE was first introduced by Sahai and Waters []. There are two different types of ABE schemes according to the manner to deploy the access control policy, key-policy attribute-based encryption (KP-ABE) [] and ciphertext-policy attribute-based encryption (CP-ABE) []. The ciphertexts are labeled with sets of attributes and access policies over these attributes are associated with clients’ private keys in the KP-ABE scheme. While every ciphertext is associated with an access policy, and every client’s private key is associated with a set of attributes in the CP-ABE scheme. However, decryption operations of most requirement that the set of attributes should satisfy the access policy in any ABE system and in most existing ABE schemes, one of the main drawbacks is that the length of the ciphertext and the decryption computational cost grow with the complexity of the access policy. This becomes critical obstacle in various applications, especially the applications on resource-limited devices.
In order to reduce the decryption time and the computation cost, Green et al. [] proposed an ABE scheme with outsourced decryption (ABE-OD). In their scheme, an authorized client first delegated an untrusted cloud server to convert the original ciphertext into a transformed ciphertext with a transformation key, and then the client obtained the plaintext from the transformed ciphertext by spending a small overhead. The ABE-OD scheme would not leak any information about the encrypted data. However, the ABE-OD proposed by Green et al. cannot ensure the correctness of the transformed ciphertext since the cloud server is public and untrusted. The untrusted cloud server may send a wrong transformed ciphertext to the clients for saving computing cost or suffering from malicious attack which also causes to generate the incorrectly transformed ciphertext. In order to ensure the correctness of the ciphertext, Lai et al. [] put forth an ABE-OD scheme that can check the correctness of the transformed ciphertext generated by the cloud server, which was called ABE with verifiable outsourced decryption (ABE-VOD). In their ABE-VOD scheme, the data owner encrypted a plaintext and a random message to the ciphertext respectively, and generated a commitment of an actual plaintext and the random message. And in the decryption algorithm of their ABE-VOD scheme, the client should compute the plaintext and the random message to use the commitment to verify whether the transformed ciphertext is generated correctly. A client was able to verify the correctness of the transformed ciphertext if and only if his/her attributes set satisfies the access structure associated with the ciphertext. Subsequently, several ABE-VOD schemes were proposed according to different methods and distinct scenarios in [,,,,]. And Qiu et al. [] used an ontology-based approach to achieve attribute-based access controls as well.
Recently, Li et al. [] proposed a full verifiability for outsourced decryption in ABE, which could simultaneously check the correctness of transformed ciphertext for the authorized clients and unauthorized clients. In their scheme, a data owner constructed two access policies for the authorized clients and unauthorized clients, respectively. And then the data owner uses a short “signature” for each ciphertext to ensure that the client could verify the validity of the transformed ciphertext. In order to avoid first computing the plaintext and then verifying the validity of the ciphertext, Li et al. used “verify-then-decrypt” skill rather than “decrypt-then-verify” paradigm. That is to say, the client first verified the validity of the ciphertext or the transformed ciphertext, and then decrypted the ciphertext and obtains the corresponding plaintext or the random message if the ciphertext or the transformed ciphertext passed the verification of its validation.
1.1. Motivation and Contribution
In cloud computing, the ABE-OD scheme cannot ensure the correctness of the ciphertext or the transformed ciphertext for cloud server being untrusted. The untrusted server may send a wrong transformed ciphertext to the users for saving computing cost or it may have suffered from malicious attack which also produces the incorrect ciphertext or transformed ciphertext. In order to ensure the correctness of the ciphertext or the transformed ciphertext, the ABE-VOD schemes were proposed in [,,,,,].
However, we firstly show that the validity verification method in decryption algorithm of the ABE-VOD scheme put forth by Li et al. [] cannot always check the validity of all ciphertexts in this paper. That is to say, there exist some invalid ciphertexts which can pass the validity checking and output the “corresponding” plaintexts. Furthermore, even if the untrusted server honestly performs the outsourced decryption for these invalid ciphertexts, the decryption algorithm cannot check them (the decryption algorithm cannot output ⊥). Thus, the “verify-then-decrypt” skill used in [] is unavailable. Then, we show that the method to check the validity of the outsourced decryption for the authorized user via checking it for the unauthorized user is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the correctness of the ciphertexts checking for the authorized user.
1.2. Organization of the Paper
2. Premilinary
In the section, we will recall the definition of ABE-VOD and some basic mathematic knowledge in [].
2.1. System Model
The ABE-VOD Scheme consists of seven algorithms: Setup, KeyGen, Encrypt, Decrypt, GenTK Transform and Decrypt The detailed is described as follows.
- Setup Take as input a security parameter and attribute universe description generate a master secret key and public parameters
- KeyGen Take as input the master secret key the public parameters and an attribute set generate the client’s private key If a client is an authorized one, use to represent the private key of the authorized client, where represents an attribute set of the authorized client. If a client is an unauthorized one, the client uses to represent the private key of the unauthorized client, where represents an attribute set of the unauthorized client.
- Encrypt Take as input the public parameters the plaintext M and two access structures and output a ciphertext
- Decrypt Take as input a private key and a ciphertext If the client’s attribute set S satisfies the access policy then the client utilizes the private key to decrypt the ciphertext; otherwise, the client utilizes the private key to decrypt the ciphertext. After the client checks the correctness of the ciphertext, he/she outputs the plaintext M if the ciphertext is valid; otherwise, the client outputs
- GenTK Take as input the public parameters and the private key genetate a transformation key and a retrieving key If a client is an authorized one, let and set otherwise, let and set
- Transform Take as input the transformation key and the ciphertext generate the transformed ciphertext
- Decrypt Take as input a ciphertext a transformed ciphertext and a retrieving key If the client’s attribute set S satisfies the access policy the client is an authorized one and then he/she utilizes and to decrypt the ciphertext; otherwise, the client utilizes the private key and to decrypt the ciphertext. After the client checks the correctness of the ciphertext, outputs the plaintext M if the ciphertext is valid; otherwise, outputs
2.2. Bilinear Pairing
Let  and  be two multiplicative groups which have the same prime order   be the multiplicative group of the finite field  A bilinear map  [], which satisfies the followings three properties:
- Bilinearity: For any
- Non-degeneracy: There are elements such that where 1 is the identity element of .
- Computability: For any elements there is an efficient algorithm to compute
The concrete bilinear pairings e will be using the modified Weil [] or Tate pairings [] on some elliptic curves. We will define two hard problems used in our paper below: Decisional Diffie-Hellman (DDH) problem and Computational Diffie-Hellman (CDH) problem. Let  be a generator of the group 
Definition 1. 
(CDH problem in  Given , to compute 
Definition 2. 
(DDH problem in  Given    , to decide whether  holds or not.
It is obvious that the DDH problem in  is easy since it can verify above congruence by using the bilinear pairing e. However, as far there is no polynomial-time algorithm to solve CDH problem in , we assume that CDH problem in  is hard.
2.3. Linear Secret Sharing Schemes
We recall a description for LSSS in []. Let  be a set of parties. A secret sharing scheme  is called linear (over ) if it satifies the following conditions.
- The secret shares of each party form a vector in
- Let A is a matrix with l rows and n columns. Let the function represent the party labeling row i as where is the ith row of Suppose a vector is the column vector and are random value in where is the secret to be shared. is the vectors of l shares for the the secret s with respect to The share belongs to party Suppose that is an LSSS of the access policy and is any authorized set. Let If are valid shares for any secret s with respect to then we can compute constants such that where
Notations. The vector  is the “target” vector of any LSSS. For any unauthorized set of rows I in  the target vector is not in the span of the rows of set  For any authorized set of rows I in  the target vector is in the span of 
3. Analysis of Li et al.’s Abe-Vod Scheme
Since ABE-VOD scheme proposed by Li et al. is much complex, we recall it in Appendix B and the security model in Appendix A.
3.1. The Excepted Functionalities of the ABE-VOD Scheme
In the subsection, we analyze the construction of the ABE-VOD scheme proposed by Li et al. The scheme wanted to get the following results at least.
- First, any ABE-VOD should have the decryption functionality. The decryption algorithm of the ABE-VOD can correctly check the valid ciphertext and invalid ciphertext (any encryption scheme must satisfy this condition). That is to say, the Decrypt algorithm outputs a corresponding plaintext of some ciphertext if and only if the ciphertext is valid, or the Decrypt algorithm outputs the corresponding plaintext of a transformed ciphertext if and only if the transformed ciphertext is correct.
- Then, the ABE-VOD scheme can simultaneously check the correctness of the transformed ciphertext for the authorized users and unauthorized users by using “verifying-then-decrypt” method to guarantee the correctness of the transformed ciphertext.
3.2. The ABE-VOD Scheme Cannot Verify the Validity of All Ciphertexts
In general, the goal of the verification formulas of the decryption algorithm are to check the correctness of ciphertext. However, the decryption algorithm of ABE-VOD scheme proposed by Li et al. only checks validity of a part of ciphertext, but not checks whether the output of the decryption algorithm for some ciphertext is the original plaintext . In the subsection, we show that there exist some ciphertexts which are verified by the decryption algorithm, but its output isn’t the original plaintext.
As analysis in [], the ciphertext stored in cloud server maybe be tampered by some malicious attackers or the transformed ciphertext could be generated via using incorrect one by the untrusted cloud server. We will view these activities as attacks of an adversary and describe how an adversary constructs an invalid ciphertext below, which the decryption algorithm will view as a valid ciphertext and output the “corresponding” plaintext.
The adversary takes as input a random message  and the two LSSS access structures  = ,  = 
The adversary first picks up a random string  two random vectors
        
      
        
      
      
      
      
    
        and
        
      
        
      
      
      
      
    
        and two random elements  such that  and  For each row  of A,  of , it picks  uniformly at random. Then, it calculates:
      
        
      
      
      
      
    
Set  and compute:
      
        
      
      
      
      
    
Set 
The ciphertext 
Obviously, the ciphertext  is not a valid ciphertext of the message M since the adversary picks two distinct random numbers  and  to produce the ciphertext , and picks two distinct random numbers  and  to produce the ciphertext . However, the decryption algorithm will view it as a valid ciphertext and output the “corresponding” plaintext. When the decryption algorithm takes as input  and  it runs as follows.
- If S satisfies the access policy , the private key of an authorized client isLet Then it calculates for such that = and computes:which equalsIt is clear that the equalityholds, where Then it computesHowever, does not equal M since That is to say, the decryption algorithm cannot refuse the plaintext of the ciphertext which is produced by other “encryption” algorithm.
- If S satisfies the access policy , the private key of an unauthorized client isLet Then it calculates for such that = and computes:which equalsFor the same reason above, the equalityholds, where Then it computesHowever, does not equal R since
Thus, the decryption algorithm of the ABE-VOD scheme proposed by Li et al. for both the authorized client and the unauthorized client cannot check the validity of all ciphertexts. I.e., there exist some invalid ciphertexts which can pass the validity checking. Furthermore, their ABE-VOD scheme cannot check the validity of the outsourcing computation by checking the correctness of the corresponding ciphertext since the output of both the Decrypt algorithm and Decrypt algorithm is not always correct.
3.3. The ABE-VOD Scheme Is Not Full Verifiable
Since verifying the correctness of the outsourced decryption for unauthorized clients is very important, Li et al. considered the following scenario. The authorized user wants to, but is not able to, process some pending businesses when the time or position of the authorized client is limited. He/she needs someone to help him/her to verify whether a pending business is correctly processed and does not want the latter to know anything about the content of the business. Thus Li et al. proposed the ABE-VOD scheme which could utilize an unauthorized client to help him/her to verify the correctness of the transformed ciphertext. We construct the following ciphertext which can pass the correctness checking for an unauthorized client but it is not a valid ciphertext for the authorized client.
The adversary takes as input a random message  and the two LSSS access structures  = ,  = 
The adversary first picks a random string  two random vectors
        
      
        
      
      
      
      
    
        and
        
      
        
      
      
      
      
    
For each row  of , it picks  uniformly at random. And it uniformly picks
        
      
        
      
      
      
      
    
        at random.
Set , then it calculates:
      
        
      
      
      
      
    
      
        
      
      
      
      
    
      
        
      
      
      
      
    
      
        
      
      
      
      
    
Set 
      
        
      
      
      
      
    
      
        
      
      
      
      
    
The ciphertext 
It is clear that if S satisfies the access policy  the authorized client cannot pass the checking of the correctness of the ciphertext. Because the elements  are random elements, which is a valid ciphertext with a negligible probability. That is to say, since the equation  with negligible probability for random elements       is a valid signature of  with negligible probability. We use the decryption algorithm to check the equality
        
      
        
      
      
      
      
    
        which holds with negligible probability for random elements   
However, if S satisfies the access policy  the unauthorized client can pass the correctness checking of the ciphertext. Because the adversary uses the Encrypt algorithm to encrypt the message R for the unauthorized client. The equations
        
      
        
      
      
      
      
    
      
        
      
      
      
      
    
        hold. That means
        
      
        
      
      
      
      
    
        always holds. Thus, the decryption algorithm can output plaintext R correctly. Especially, when the untrusted server honestly runs the Transform algorithm, the unauthorized client can always pass the correctness checking of the transformed ciphertext.
Thus, the ABE-VOD scheme cannot verify the correctness of the ciphertext or the transformed ciphertext for the authorized user via verifying it for the unauthorized user.
3.4. Furthermore Analysis
We have showed that the decryption algorithm cannot satisfy two functionalities, checking the correctness of all ciphertexts and “full verifiable” above. Next, we will explain the reason and possibly reasonable method.
On one hand, the construction of the above ABE-VOD scheme utilized ABE-OD scheme proposed by Green et al. [] and short signature scheme proposed by Boneh et al. []. The one-time signature  of a “message”  (or  of a “message” ) is unforgeable and it also ensures that
        
      
        
      
      
      
      
    
        or
        
      
        
      
      
      
      
    
        holds if and only if  and  are valid signatures of  (or  and ) under public key  and  respectively. However, there is no condition that guarantees the validity of  and  That is to say, we can choose any random element as  (or ). Thus, the above adversary can construct an invalid  or  but the ciphertext  can be verified as a valid ciphertext. It seems that the method to sign a part of the ciphertext cannot guarantee all invalid ciphertexts to be refused. It needs another secure mechanism to guarantee the part of the ciphertext is valid.
On the other hand, from the unauthorized client’s view,  is a random element in  which is independent of  and  Thus, the unauthoized client has no capability to verify the validity of  and the construction in [] cannot check the correctness of the ciphertext and the transformed ciphertext for the authorized users by checking the validity of the ciphertext and the correctness of the transformed ciphertext for the unauthorized clients.
4. Conclusions
In this paper, we showed that the validity verification method in decryption algorithm of the ABE-VOD scheme put forth by Li et al. cannot always check the validity of all ciphertexts. There exist some invalid ciphertexts which can pass the validity checking and the “verify-then-decrypt” skill used in [] is unavailable. Then, we showed that the method to check the validity of the outsourced decryption for the authorized client via checking it for the unauthorized client was not always correct. There exist some invalid ciphertexts which can pass the validity checking for the unauthorized client but cannot pass the validity checking for the authorized client. Finally, we pointed out that although the scheme used signature skill to guarantee the ciphertext cannot be tampered, the signing key of the “signature scheme” used in the encryption scheme was not fixed and anyone can generated it. That caused our constructions.
Acknowledgments
Our work was supported by the Sichuan Key Technology Support Program (No. 18ZDYF2907).
Author Contributions
The five authors of the paper have extensively participated in all of the paper analysis and manuscript revised. Fagen Li, Shaoquan Jiang and Shijie Zhou added to and revised the related works. Yongjian Liao and Yichuan He mainly wrote the manuscript.
Conflicts of Interest
The authors declare no conflict of interest.
Appendix A. Security Model
We recall the security model in []. We first consider the selective chosen plaintext attack (CPA) security model for ABE with fully verifiable outsourcing decryption is described by the following game between an adversary  and a challenger 
- The adversary sets a challenge access policy that it wishes to challenge.
- The challenger executes the algorithm Setup to generate the public parameters and the master secret key sends to and keeps secret.
- The challenger sets a set D and a table T initially empty. The adversary makes the following queries:- -
- (1) query. The adversary makes private key queries on an attribute set the challenger runs KeyGen algorithm to generate a private key and sets Then it returns the private key to the adversary . The only restriction is that the attribute set cannot satisfy the access policy
- -
- (2) query. makes transformation key queries on an attribute set and searches the tuple in the table If such tuple exists, it returns as response. Otherwise, it executes KeyGen to generate and GenTK to generate Then the adversary stores the tuple in table It returns the transformation key to
 
- The adversary submits two messages and with the same size. Then randomly picks a bit and R with the same length as and and computes Encrypt. Finally, the challenger sends to to as a challenge ciphertext.
- proceeds to make queries and queries as Phase 1, however the only restriction is that the attribute set does not satisfy the access policy
- outputs its guess with respect to b and wins the game if
The advantage of the adversary  in the above game is
        
      
        
      
      
      
      
    
        where the probability is taken over the random bits by the adversary  and the challenger 
Definition A1. 
An ABE-VOD scheme is selective CPA-secure if every polynomial time adversary  has at most a negligible advantage in the above game.
Next, we review the formal definition of verifiability for an ABE-VOD scheme through a game between an adversary  and a challenger  []. The definition is just considered the part of the authorized user here, which is the same as the definition of verifiability for the unauthorized user. The game is described as follows:
- The adversary sets an access policy that it wishes to challenge.
- Setup. The challenger runs the Setup) to generate the public parameters and the master key then keeps secret and sends to the adversary.
- The adversary can execute the query and the query as in Phase 1 in the above security game.- -
- (1) query. The adversary makes private key queries on an attribute set the challenger runs KeyGen to generate and sets which is initially empty. It then returns the private key to the adversary. The only restriction is that the attribute set S cannot satisfy the access policy
- -
- (2) query. makes transformation key queries on the attribute set searches the tuple in the table If the tuple exists, returns as a response. Otherwise, it executes KeyGen to generate and GenTK to generate Then stores the tuple in table T and returns the transformation key to
 
- The adversary submits a message The challenger computes a challenge ciphertext = Encrypt and sends it to
- The same as Phase 1.
- The adversary outputs an attributes set and a transformed ciphertext . We assume that the adversary knows The adversary wins the game if
The advantage of the adversary  is
Definition A2. 
(Verifiability) An ABE-VOD scheme is verifiable, if for any polynomial time adversary  the advantage  is negligible in the security parameter.
Appendix B. Review of Li et al.’s Abe-Vod Scheme
Here, we recall the ABE-VOD scheme proposed by Li et al.
- Setup Take as input the security parameter and the attribute set U = . Generate bilinear group where and are two multiplicative groups with a prime order Choose a random generator random elements and , computes Then generate three collision resistance hash functionsand= are published as the public parameters. The master secret key is
- KeyGen To generate private keys for two types of clients (the authorized client and the unauthorized client). If S is an attribute set of the authorized client, then the algorithm picks a random value The private key of the authorized client isIf S is an attribute set of the unauthorized client, then the algorithm picks a random value The private key for the unauthorized client is
- Encrypt Take as input a message and two LSSS access structures = , = . A and are two matrixes. is a map from each row of A to an attribute and is a map from each row of to an attribute . The encryption algorithm first picks a random string and two random vectorsandFor each row of A, of , it picks uniformly at random. Then it computes:SetSetThe ciphertext
- Decrypt Take as input the private key an attribute set S of the client and a ciphertext =- -
- (1) If S satisfies the access policy , then the client is an authorized one and the private key of the client is = = Let I = Then the client is able to compute for such that and the client calculates:and After the client checks whether the following equalityholds or not. If it holds, the client calculatesotherwise, the client outputs
- -
- (2) If S satisfies the access policy , then the client is an unauthorized one and the private key of the client is = = Let I = Then the client is able to compute for such that and the client calculates:and After the client checks whether the following equalityholds or not. If it holds, the client computesotherwise, the client outputs
 
- GenTK Take the private key as input. If the client is an authorized one, the private key is = If the client is an unauthorized one, the private key is = = Then the client picks two random values and the transformation keys areandrespectively. The retrieving keys are and respectively.
- Transform Takes as input the ciphertext and the transformation key For the authorized client, the transformation key is , and for the unauthorized client, the transformation key is . The transformed is described as follows.Finally, the transformed ciphertextif the attribute set S of the user satisfies the access policy orif the attribute set S of the client satisfies the access policy
- Decrypt Takes as input the ciphertext = the transformed ciphertext and the retrieving key The retrieving key of the authorized client = = and the retrieving key of the unauthorized client = =- -
- (1) If the attribute set S of the client satisfies the access policy the client verifies whetherholds, if it does, then the client outputsotherwise, the client outputs
- -
- (2) If the attribute set S of the client satisfies the access policy the client verifies whetherholds, if it does, then the client outputsotherwise, the client outputs
 
References
- Yu, J.; Ren, K.; Wang, C. Enabling Cloud Storage Auditing with Verifiable Outsourcing of Key Updates. IEEE Trans. Inf. Forensics Secur. 2016, 11, 1362–1375. [Google Scholar] [CrossRef]
- Su, Q.; Yu, J.; Tian, C.; Zhang, H.; Hao, R. How to Securely Outsource the Inversion Modulo a Large Composite Number. J. Syst. Softw. 2017, 127, 26–34. [Google Scholar] [CrossRef]
- Liao, Y.; He, Y.; Li, F.; Zhou, S. Analysis of a Mobile Payment Protocol with Outsourced Verification in Cloud Server and the Improvement. Comput. Stand. Interfaces 2018, 56, 101–106. [Google Scholar] [CrossRef]
- Sahai, A.; Waters, B. Fuzzy Identity-Based Encryption. In Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 22–26 May 2005; pp. 457–473. [Google Scholar]
- Goyal, V.; Pandey, O.; Sahai, A.; Waters, B. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data. In Proceedings of the 13th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 30 October–3 November 2006; pp. 89–98. [Google Scholar]
- Bethencourt, J.; Sahai, A.; Waters, B. Ciphertext-Policy Attribute-Based Encryption. In Proceedings of the IEEE Symposium on Security Privacy, Berkeley, CA, USA, 20–23 May 2007; pp. 321–334. [Google Scholar]
- Green, M.; Hohenberger, S.; Waters, B. Outsourcing the Decryption of Abe Ciphertexts. In Proceedings of the 20th USENIX Conference on Security Symposium, San Francisco, CA, USA, 8–12 August 2011; p. 34. [Google Scholar]
- Lai, J.; Deng, R.; Guan, C.; Weng, J. Attribute-Based Encryption with Verifiable Outsourced Decryption. IEEE Trans. Inf. Forensics Secur. 2013, 8, 1343–1354. [Google Scholar]
- Qin, B.; Deng, R.H.; Liu, S.; Ma, S. Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption. IEEE Trans. Inf. Forensics Secur. 2015, 10, 1384–1393. [Google Scholar]
- Mao, X.; Lai, J.; Mei, Q.; Chen, K.; Weng, J. Generic and Efficient Constructions of Attribute-Based Encryption with Verifiable Outsourced Decryption. IEEE Trans. Dependable Secure Comput. 2015. [Google Scholar] [CrossRef]
- Lin, S.; Zhang, R.; Ma, H.; Wang, M. Revisiting Attribute-Based Encryption with Efficient Verifiable Outsourced Decryption. IEEE Trans. Inf. Forensics Secur. 2015, 10, 2119–2130. [Google Scholar] [CrossRef]
- Li, J.; Huang, X.; Li, J.W.; Chen, X.; Xiang, Y. Securely Outsourcing Attribute-Based Encryption with Checkability. IEEE Trans. Parallel Distribu. Syst. 2014, 25, 2201–2210. [Google Scholar] [CrossRef]
- Li, J.; Sha, F.; Zhang, Y.; Huang, X.; Shen, J. Verifiable out-Sourced Decryption of Attribute-Based Encryption with Con-Stant Ciphertext Length. Secur. Commun. Netw. 2017. [Google Scholar] [CrossRef]
- Qiu, M.; Gai, K.; Thuraisingham, B.; Tao, L.; Zhao, H. Proactive User-Centric Secure Data Scheme Using Attribute-Based Semantic Access Controls for Mobile Clouds in Financial Industry. Future Gener. Comput. Syst. 2018, 80, 421–429. [Google Scholar] [CrossRef]
- Li, J.; Wang, Y.; Zhang, Y.; Han, J. Full Verifiability for Outsourced Decryption in Attribute Based Encryption. IEEE Trans. Serv. Comput. 2017. [Google Scholar] [CrossRef]
- Boneh, D.; Lynn, B.; Shacham, H. Short Signatures from the Weil Pairing. In Proceedings of the ASIACRYPT 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, 9–13 December 2001; Volume 2248, pp. 514–532. [Google Scholar]
- Boneh, D.; Franklin, M. Identity-Based Encryption from the Weil Pairing. In Proceedings of the CRYPTO 21st Annual International Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2001; Volume 2139, pp. 213–229. [Google Scholar]
- Miyaji, A.; Nakabayashi, M.; Takano, S. New Explicit Conditions of Elliptic Curve Traces for FR-Reduction. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2001, 84, 1234–1243. [Google Scholar]
- Beimel, A. Secure Schemes for Secret Sharing and Key Distribution. Ph.D. Dissertation, Israel Institute of Technology, Technion City, Haifa, Israel, 1996. [Google Scholar]
© 2018 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
