45
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: found
      • Article: found
      Is Open Access

      Analysis of an ABE Scheme with Verifiable Outsourced Decryption

      research-article

      Read this article at

      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Abstract

          Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users’ data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their “verify-then-decrypt” skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user.

          Related collections

          Most cited references19

          • Record: found
          • Abstract: not found
          • Article: not found

          Securely Outsourcing Attribute-Based Encryption with Checkability

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Full Verifiability for Outsourced Decryption in Attribute Based Encryption

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Attribute-Based Encryption With Efficient Verifiable Outsourced Decryption

                Bookmark

                Author and article information

                Journal
                Sensors (Basel)
                Sensors (Basel)
                sensors
                Sensors (Basel, Switzerland)
                MDPI
                1424-8220
                10 January 2018
                January 2018
                : 18
                : 1
                : 176
                Affiliations
                [1 ]School of Information and Software Engineering, University of Electronic Science and Technology of China, Chengdu 610054, China; 201622060427@ 123456std.uestc.edu.cn (Y.H.); sjzhou@ 123456uestc.edu.cn (S.Z.)
                [2 ]School of Computer Science and Engineering, University of Electronic Science and Technology of China, Chengdu 611731, China; fagenli@ 123456uestc.edu.cn
                [3 ]Institute of Information Security, Mianyang Normal University, Mianyang 621000, China; shaoquan.jiang@ 123456gmail.com
                Author notes
                [* ]Correspondence: liaoyj@ 123456uestc.edu.cn
                Author information
                https://orcid.org/0000-0003-3139-8528
                Article
                sensors-18-00176
                10.3390/s18010176
                5795761
                29320418
                9b8bca00-d92a-4386-bf0e-0f5aca15a5ac
                © 2018 by the authors.

                Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license ( http://creativecommons.org/licenses/by/4.0/).

                History
                : 25 December 2017
                : 05 January 2018
                Categories
                Article

                Biomedical engineering
                attribute-based encryption,outsourced decryption,verifiable,cloud computing,authorized client,wireless sensor

                Comments

                Comment on this article