You are on page 1of 4

Revisting Attribute-Based Encryption with Verifiable

Outsourced Decryption
A.Sridhar
III MCA, Department of MCA, Paavai Enginnering College, Namakkal, Tamil Nadu

Abstract Attribute-based encryption (ABE) is a promising 2) How to construct an ABE with verifiable outsourced
technique for fine-grained access control of encrypted data in a decryption more efficiently?
cloud storage, however, decryption involved in the ABEs is
usually too expensive for resource-constrained front-end users, encryption (ABE) [1] was thus proposed to have flexible
which greatly hinders its practical popularity. In order to reduce access control of encrypted data utilizing access policies and
the decryption overhead for a user to recover the plaintext, ascribed attributes associated with private keys and ciphertexts
Green et al. suggested to outsource the majority of the decryption respectively. In an ABE scheme, a specified private key can
decrypt a particular ciphertext only if associated attributes
work without revealing actually data or private keys. To ensure and policy are matched. According to the ciphertext associ-
the third-party service honestly computes the outsourced work, ated with an access policy or containing a set of attributes,
Lai et al. provided a requirement of verifiability to the decryption ABE schemes are divided into two kinds: ciphertext-
of ABE, but their scheme doubled the size of the underlying ABE policy (CP) ABE [4]-[7] and key-policy (KP) ABE [8], [9].
cipher text and the computation costs. Roughly speaking, their
main idea is to use a parallel encryption technique, while one of The functionality of access control is very powerful,
the encryption components is used for the verification purpose. however, expensive. For most of the existing pairing-based
Hence, the bandwidth and the computation cost are doubled. In ABE schemes (see [6], [8]), the number of pairing operations
this paper, we investigate the same problem. In particular, we to decrypt a ciphertext is linear to the complexity of the access
propose a more efficient and generic construction of ABE with policy. It would be a significant challenge for users to complete
verifiable outsourced decryption based on an attribute-based
key encapsulation mechanism, a symmetric-key encryption the decryption independently on resource-constrained devices,
scheme and a commitment scheme. Then, we prove the security e.g., mobile phones. In order to reduce the number of pairing
and the verification soundness of our constructed ABE scheme in operations for users when executing the decryption algorithm,
the standard model. Finally, we instantiate our scheme with Green et al. [2] considered outsourcing the heavy computation
concrete building blocks. Compared with Lai et al.s scheme, our of decryption to a third-party service, which helps to imple-
scheme reduces the bandwidth and the computation costs almost
ment thin clients. They proposed a key blinding technique
by half.
to outsource the decryption without leaking data or secret
Keywords Attribute-based encryption, keys as a precaution against maliciously detecting from the
outsourced, decryption, verifiability, access third-party service. A user provides a transformed key to
control. the service to outsource an ABE ciphertext and obtains a
constant-size ElGamal-style ciphertext, then utilizes the secret
retrieving key to recover the plaintext.
I. INTRODUCTION
To guarantee the third-party service honestly executes
With the rapid development of cloud computing, the outsourced computation, Lai et al. (LDGW) [3] introduced
growing data is being centralized into the cloud for sharing. verifiability to the outsourced decryption of ABE. Actually,
To keep the data security and privacy for data owners, they added an extra instance to the underlying ABE scheme [6]
the sharing data needs to be encrypted before being uploaded
and fine-grained access control is required. Attribute-based in the encryption/decryption algorithms, which is used for
encryption (ABE) [1] was thus proposed to have flexible verification. The technique added noticeable overhead to the
access control of encrypted data utilizing access policies and underlying ABE scheme: encryption requires the data sender
ascribed attributes associated with private keys and cipher to encrypt an extra random message and compute a checksum
texts value related to two messages; decryption requires the
respectively. In an ABE scheme, a specified private key can third-party service to execute the underlying decryption
decrypt a particular cipher text only if associated attributes algorithm twice and the data receiver to verify the outsourced
and policy are matched. According to the ciphertext associ- computation with respect to the encrypted messages. Although
ated with an access policy or containing a set of attributes,
ABE schemes are divided into two kinds: ciphertext- the LDGW-scheme [3] is easy to understand, it works not so
policy (CP) ABE [4]-[7] and key-policy (KP) ABE [8], [9]. well in practice: First, the scheme doubles the computation
1) Whether there exists a generic construction to introduce costs of encryption and decryption compared to the underlying
verification to the outsourced decryption of ABE?
ABE scheme. Second, the length of the ciphertext is twice B. Units
of that of the underlying ABE ciphertext. Therefore, the Use either SI (MKS) or CGS as primary units. (SI
following questions arise naturally: units are encouraged.) English units may be used as
In this paper, we revisit ABE with verifiable outsourced secondary units (in parentheses). An exception would
decryption (VO-ABE), and try to solve these problems. be the use of English units as identifiers in trade, such
We first present a generic construction of VO-ABE, based on as 3.5-inch disk drive.
an attribute-based key encapsulation mechanism (AB-KEM), Avoid combining SI and CGS units, such as current in
a symmetric-key encryption scheme and a commitment amperes and magnetic field in oersteds. This often
scheme. In our opinion, hybrid encryption and a commitment leads to confusion because equations do not balance
can be used to add verification to the outsourced decryption dimensionally. If you must use mixed units, clearly
more efficiently and a proper verification algorithm should state the units for each quantity that you use in an
be defined as a constraint during the final decryption for equation.
the data receiver. Similar to the idea of blinding technique
in [2], we propose an appropriate transform for the actual Do not mix complete spellings and abbreviations of
secret key to achieve outsourcing the decryption. In fact, the units: Wb/m2 or webers per square meter, not
transform we used here may be thought as a subclass of webers/m2. Spell units when they appear in text: ...a
all-or-nothing transforms (AONTs) [10], [11] with specific few henries, not ...a few H.
properties ensuring secure outsourced computation. We insist
that our construction of VO-ABE is comprehensive and can Use a zero before decimal points: 0.25, not .25.
be operated easily and as secure as [3]. Use cm3, not cc. (bullet list)

A. Our Contributions C. Equations


First, confirm that you have the correct template for your The equations are an exception to the prescribed
paper size. This template has been tailored for output on the specifications of this template. You will need to determine
A4 paper size. If you are using US letter-sized paper, please whether or not your equation should be typed using either the
close this file and download the file MSW_USltr_format. Times New Roman or the Symbol font (please no other font).
To create multileveled equations, it may be necessary to treat
A. Maintaining the Integrity of the Specifications the equation as a graphic and insert it into the text after your
The template is used to format your paper and style the paper is styled.
text. All margins, column widths, line spaces, and text fonts Number equations consecutively. Equation numbers,
are prescribed; please do not alter them. You may note within parentheses, are to position flush right, as in (1), using
peculiarities. For example, the head margin in this template a right tab stop. To make your equations more compact, you
measures proportionately more than is customary. This may use the solidus ( / ), the exp function, or appropriate
measurement and others are deliberate, using specifications exponents. Italicize Roman symbols for quantities and
that anticipate your paper as one part of the entire proceedings, variables, but not Greek symbols. Use a long dash rather than
and not as an independent document. Please do not revise any a hyphen for a minus sign. Punctuate equations with commas
of the current designations. or periods when they are part of a sentence, as in

II. PREPARE YOUR PAPER BEFORE STYLING ab


Before you begin to format your paper, first write and save
the content as a separate text file. Keep your text and graphic
files separate until after the text has been formatted and styled.
Do not use hard tabs, and limit use of hard returns to only one Note that the equation is centered using a center tab stop.
return at the end of a paragraph. Do not add any kind of Be sure that the symbols in your equation have been defined
pagination anywhere in the paper. Do not number text heads- before or immediately following the equation. Use (1), not
the template will do that for you. Eq. (1) or equation (1), except at the beginning of a
Finally, complete content and organizational editing before sentence: Equation (1) is ...
formatting. Please take note of the following items when
proofreading spelling and grammar: D. Some Common Mistakes
The word data is plural, not singular.
A. Abbreviations and Acronyms
The subscript for the permeability of vacuum 0, and
Define abbreviations and acronyms the first time they are other common scientific constants, is zero with
used in the text, even after they have been defined in the subscript formatting, not a lowercase letter o.
abstract. Abbreviations such as IEEE, SI, MKS, CGS, sc, dc,
and rms do not have to be defined. Do not use abbreviations in In American English, commas, semi-/colons, periods,
the title or heads unless they are unavoidable. question and exclamation marks are located within
quotation marks only when a complete thought or
name is cited, such as a title or full quotation. When
Identify applicable sponsor/s here. If no sponsors, delete this text box (sponsors).
quotation marks are used, instead of a bold or italic c) Deletion: Delete the author and affiliation lines for
typeface, to highlight a word or phrase, punctuation the second affiliation.
should appear outside of the quotation marks. A 2) For author/s of more than two affiliations: To change
parenthetical phrase or statement at the end of a
the default, adjust the template as follows.
sentence is punctuated outside of the closing
parenthesis (like this). (A parenthetical sentence is a) Selection: Highlight all author and affiliation lines.
punctuated within the parentheses.) b) Change number of columns: Select the Columns
A graph within a graph is an inset, not an insert. icon from the MS Word Standard toolbar and then select 1
The word alternatively is preferred to the word Column from the selection palette.
alternately (unless you really mean something that c) Highlight author and affiliation lines of affiliation 1
alternates). and copy this selection.
Do not use the word essentially to mean d) Formatting: Insert one hard return immediately after
approximately or effectively. the last character of the last affiliation line. Then paste down
the copy of affiliation 1. Repeat as necessary for each
In your paper title, if the words that uses can
additional affiliation.
accurately replace the word using, capitalize the u; if
not, keep using lower-cased. e) Reassign number of columns: Place your cursor to
the right of the last character of the last affiliation line of an
Be aware of the different meanings of the even numbered affiliation (e.g., if there are five affiliations,
homophones affect and effect, complement and
place your cursor at end of fourth affiliation). Drag the cursor
compliment, discreet and discrete, principal
up to highlight all of the above author and affiliation lines. Go
and principle.
to Column icon and select 2 Columns. If you have an odd
Do not confuse imply and infer. number of affiliations, the final affiliation will be centered on
the page; all previous will be in two columns.
The prefix non is not a word; it should be joined to
the word it modifies, usually without a hyphen. B. Identify the Headings
There is no period after the et in the Latin Headings, or heads, are organizational devices that guide
abbreviation et al. the reader through your paper. There are two types:
component heads and text heads.
The abbreviation i.e. means that is, and the
abbreviation e.g. means for example. Component heads identify the different components of
your paper and are not topically subordinate to each other.
An excellent style manual for science writers is [7]. Examples include ACKNOWLEDGMENTS and
REFERENCES, and for these, the correct style to use is
III. USING THE TEMPLATE Heading 5. Use figure caption for your Figure captions,
After the text edit has been completed, the paper is ready and table head for your table title. Run-in heads, such as
for the template. Duplicate the template file by using the Save Abstract, will require you to apply a style (in this case,
As command, and use the naming convention prescribed by italic) in addition to the style provided by the drop down menu
your conference for the name of your paper. In this newly to differentiate the head from the text.
created file, highlight all of the contents and import your Text heads organize the topics on a relational, hierarchical
prepared text file. You are now ready to style your paper; use basis. For example, the paper title is the primary text head
the scroll down window on the left of the MS Word because all subsequent material relates and elaborates on this
Formatting toolbar. one topic. If there are two or more sub-topics, the next level
head (uppercase Roman numerals) should be used and,
A. Authors and Affiliations conversely, if there are not at least two sub-topics, then no
The template is designed so that author affiliations are not subheads should be introduced. Styles named Heading 1,
repeated each time for multiple authors of the same affiliation. Heading 2, Heading 3, and Heading 4 are prescribed.
Please keep your affiliations as succinct as possible (for
example, do not differentiate among departments of the same C. Figures and Tables
organization). This template was designed for two affiliations. 1) Positioning Figures and Tables: Place figures and
1) For author/s of only one affiliation (Heading 3): To tables at the top and bottom of columns. Avoid placing them in
change the default, adjust the template as follows. the middle of columns. Large figures and tables may span
a) Selection (Heading 4): Highlight all author and across both columns. Figure captions should be below the
affiliation lines. figures; table heads should appear above the tables. Insert
figures and tables after they are cited in the text. Use the
b) Change number of columns: Select the Columns icon abbreviation Fig. 1, even at the beginning of a sentence.
from the MS Word Standard toolbar and then select 1
Column from the selection palette. TABLE I. TABLE STYLES
Table Table Column Head Ref. [3] or reference [3] except at the beginning of a
Head Table column subhead Subhead Subhead sentence: Reference [3] was the first ...
copy More table copya Number footnotes separately in superscripts. Place the
a.
Sample of a Table footnote. (Table footnote)
actual footnote at the bottom of the column in which it was
b.
cited. Do not put footnotes in the reference list. Use letters for
table footnotes.
Fig. 1. Example of a figure caption. (figure caption)
Unless there are six authors or more give all authors
Figure Labels: Use 8 point Times New Roman for Figure names; do not use et al.. Papers that have not been
labels. Use words rather than symbols or abbreviations when published, even if they have been submitted for publication,
writing Figure axis labels to avoid confusing the reader. As an should be cited as unpublished [4]. Papers that have been
example, write the quantity Magnetization, or accepted for publication should be cited as in press [5].
Magnetization, M, not just M. If including units in the Capitalize only the first word in a paper title, except for proper
label, present them within parentheses. Do not label axes only nouns and element symbols.
with units. In the example, write Magnetization (A/m) or For papers published in translation journals, please give
Magnetization (A ( m(1), not just A/m. Do not label axes the English citation first, followed by the original foreign-
with a ratio of quantities and units. For example, write language citation [6].
Temperature (K), not Temperature/K.
[1] G. Eason, B. Noble, and I.N. Sneddon, On certain integrals of
Acknowledgment (HEADING 5) Lipschitz-Hankel type involving products of Bessel functions, Phil.
Trans. Roy. Soc. London, vol. A247, pp. 529-551, April 1955.
The preferred spelling of the word acknowledgment in (references)
America is without an e after the g. Avoid the stilted [2] J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol.
expression one of us (R. B. G.) thanks .... Instead, try R. B. 2. Oxford: Clarendon, 1892, pp.68-73.
G. thanks.... Put sponsor acknowledgments in the [3] I.S. Jacobs and C.P. Bean, Fine particles, thin films and exchange
unnumbered footnote on the first page. anisotropy, in Magnetism, vol. III, G.T. Rado and H. Suhl, Eds. New
York: Academic, 1963, pp. 271-350.
[4] K. Elissa, Title of paper if known, unpublished.
[5] R. Nicole, Title of paper with only first word capitalized, J. Name
References Stand. Abbrev., in press.
[6] Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, Electron spectroscopy
The template will number citations consecutively within studies on magneto-optical media and plastic substrate interface, IEEE
brackets [1]. The sentence punctuation follows the bracket [2]. Transl. J. Magn. Japan, vol. 2, pp. 740-741, August 1987 [Digests 9th
Refer simply to the reference number, as in [3]do not use Annual Conf. Magnetics Japan, p. 301, 1982].
[7] M. Young, The Technical Writers Handbook. Mill Valley, CA:
University Science, 1989.

We suggest that you use a text box to insert a graphic


(which is ideally a 300 dpi resolution TIFF or EPS file
with all fonts embedded) because this method is somewhat
more stable than directly inserting a picture.
To have non-visible rules on your frame, use the
MSWord Format pull-down menu, select Text Box >
Colors and Lines to choose No Fill and No Line.

You might also like