Outsourcing the Decryption of Ciphertexts for Predicate Encryption via Pallier Paradigm

With the proliferation of computation and storage outsourcing, access control has become one of the vital problems in cloud computing. Supporting more complex and flexible function, predicate encryption (PE) is gaining more and more attention in access control of decryption outsourcing. Based on the somewhat homomorphic encryption Paillier scheme and combined with Green’s scheme which supports outsourcing the decryption ciphertexts, we constructed a Paillier type outsourcing the decryption ciphertexts via predicate encryption. In this scheme, decryption can be outsourced to the cloud, and which can greatly reduce the storage and computation costs of user end. Moreover, the scheme supports arbitrary homomorphic addition and one homomorphic multiplication on ciphertexts. IND-AH-CPA security of the scheme is proved under subgroup decision assumption.

[1]  Allison Bishop,et al.  New Techniques for Dual System Encryption and Fully Secure HIBE with Short Ciphertexts , 2010, IACR Cryptol. ePrint Arch..

[2]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[3]  Zhang Wei A Pairing-based Homomorphic Encryption Scheme for Multi-User Settings , 2016 .

[4]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[5]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[6]  Li Li,et al.  Method for Improving Data Security in Register Files Based on Multiple Pipeline Restart , 2015, Int. J. Inf. Technol. Web Eng..

[7]  Hitesh Tewari,et al.  Homomorphic Encryption with Access Policies: Characterization and New Constructions , 2013, AFRICACRYPT.

[8]  Brent Waters,et al.  Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based , 2013, CRYPTO.

[9]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[10]  Matthew Green,et al.  Outsourcing the Decryption of ABE Ciphertexts , 2011, USENIX Security Symposium.

[11]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization , 2011, Public Key Cryptography.

[12]  Craig Gentry,et al.  Fully Homomorphic Encryption with Polylog Overhead , 2012, EUROCRYPT.

[13]  Brent Waters,et al.  Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.

[14]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[15]  Kai Yang,et al.  An Exact and Efficient Privacy-Preserving Spatiotemporal Matching in Mobile Social Networks , 2016, Int. J. Technol. Hum. Interact..

[16]  Karim Mezghani,et al.  Factors Explaining IS Managers Attitudes toward Cloud Computing Adoption , 2016, Int. J. Technol. Hum. Interact..