A Survey on Outsourced Attribute-Based Encryption Technique
Keywords:
Attribute-based encryption, Key Generation Service Provider, Decryption Service Provider, Access control, Outsourcing computation, Key issuing, CheckabilityAbstract
In the modern times, more sensitive data is being stored on third party servers which are untrusted, so data on these sites need to be in encrypted form. Every now and then new encryption techniques are put forward. Attribute Based Encryption (ABE) is one such cryptographic technique that secures the data and provides fine-grained access control. However, The Computational complexities of ABE key issuing and decryption are getting too high due to the high expressiveness of ABE approach which affects the efficiency of ABE. To tackle this, many Outsourced Variants of ABE have been proposed to improve the efficiency of ABE such that it could be widely deployed. In this paper, a survey is done on various ABE techniques that have been proposed and their advantages and disadvantages are also discussed.
References
A. Sahai and B. Waters, ‘‘Fuzzy Identity-Based Encryption,’’ in Proc. Adv. Cryptol.-EUROCRYPT, LNCS 3494, R. Cramer, Ed., Berlin, Germany, 2005, pp. 457-473, Springer-Verlag.
M. Green, S. Hohenberger, and B. Waters, ‘‘Outsourcing the Decryption of ABE Ciphertexts,’’ in Proc. 20th USENIX Conf. SEC, 2011, p. 34.
Z. Zhou and D. Huang, ‘‘Efficient and Secure Data Storage Operations for Mobile Cloud Computing,’’ in Cryptology ePrint Archive, Report 2011/185, 2011.
P. Golle and I. Mironov, ‘‘Uncheatable Distributed Computations,’’ in Proc. Conf. Topics Cryptol., CT-RSA, 2001, pp. 425-440.
V. Goyal, O. Pandey, A. Sahai, and B. Waters, ‘‘Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data,’’ in Proc. 13th ACM Conf. Comput. Commun. Security, 2006, pp. 89-98.
J. Bethencourt, A. Sahai, and B. Waters, ‘‘Ciphertext-Policy Attribute-Based Encryption,’’ in Proc. IEEE Symp. Security Privacy, May 2007, pp. 321-334.
Mewada, Shivlal, Pradeep Sharma, and S. S. Gautam. "Classification of Efficient Symmetric Key Cryptography Algorithms." International Journal of Computer Science and Information Security 14.2 (2016): pp(105-110).
S. Hohenberger and A. Lysyanskaya, ‘‘How to Securely Outsource Cryptographic Computations,’’ in Proc. Theory Cryptogr., LNCS 3378, J. Kilian, Ed., Berlin, Germany, pp. 264-282, Springer- Verlag.
S. Goldwasser, Y.T. Kalai, and G.N. Rothblum, ‘‘Delegating Computation: Interactive Proofs for Muggles,’’ in Proc. 40th Annu. ACM STOC, 2008, pp. 113-122.
C. Gentry, ‘‘Fully Homomorphic Encryption Using Ideal Lattices,’’ in Proc. 41st Annu. ACM STOC, 2009, pp. 169-178.
C.Gentry and S.Halevi, ‘‘ImplementingGentry’s Fully-Homomorphic Encryption Scheme,’’ in Proc. Adv. Cryptol.-EUROCRYPT, LNCS 6632, K. Paterson, Ed., Berlin, Germany, 2011, pp. 129-148, Springer-Verlag.
J. Li, X. Chen, J. Li, C. Jia, J. Ma, and W. Lou, ‘‘Fine-Grained Access Control System Based on Outsourced Attribute-Based Encryption,’’ in Proc. 18th ESORICS, 2013, pp. 592-609.
M.J. Atallah, K. Pantazopoulos, J.R. Rice, and E.E. Spafford, ‘‘Secure Outsourcing of Scientific Computations,’’ in Trends in Software Engineering, vol. 54, M.V. Zelkowitz, Ed. Amsterdam, The Netherlands: Elsevier, 2002, pp. 215-272.
R. Gennaro, C. Gentry, and B. Parno, ‘‘Non-Interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers,’’ in Proc. Adv. Cryptol.-CRYPTO, LNCS 6223, T. Rabin, Ed., Berlin, Germany, 2010, pp. 465-482, Springer-Verlag
K.-M. Chung, Y.Kalai, F.-H. Liu, and R. Raz, ‘‘MemoryDelegation,’’ in Proc. Adv. Cryptol.-CRYPTO, LNCS 6841, P. Rogaway, Ed., Berlin, 2011, pp. 151-168, Springer-Verlag.
D. Zeng, S. Guo, and J. Hu, ‘‘Reliable Bulk-Data Dissemination in Delay Tolerant Networks,’’ IEEE Trans. Parallel Distrib. Syst. http://doi.ieeecomputersociety.org/10.1109/TPDS.2013.221.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
