Literature DB >> 29320418

Analysis of an ABE Scheme with Verifiable Outsourced Decryption.

Yongjian Liao1, Yichuan He2, Fagen Li3, Shaoquan Jiang4, Shijie Zhou5.   

Abstract

Attribute-based encryption (ABE) is a popular cryptographic technology to protect the security of users' data in cloud computing. In order to reduce its decryption cost, outsourcing the decryption of ciphertexts is an available method, which enables users to outsource a large number of decryption operations to the cloud service provider. To guarantee the correctness of transformed ciphertexts computed by the cloud server via the outsourced decryption, it is necessary to check the correctness of the outsourced decryption to ensure security for the data of users. Recently, Li et al. proposed a full verifiability of the outsourced decryption of ABE scheme (ABE-VOD) for the authorized users and unauthorized users, which can simultaneously check the correctness of the transformed ciphertext for both them. However, in this paper we show that their ABE-VOD scheme cannot obtain the results which they had shown, such as finding out all invalid ciphertexts, and checking the correctness of the transformed ciphertext for the authorized user via checking it for the unauthorized user. We first construct some invalid ciphertexts which can pass the validity checking in the decryption algorithm. That means their "verify-then-decrypt" skill is unavailable. Next, we show that the method to check the validity of the outsourced decryption for the authorized users via checking it for the unauthorized users is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the validity checking for the authorized user.

Entities:  

Keywords:  attribute-based encryption; authorized client; cloud computing; outsourced decryption; verifiable; wireless sensor

Year:  2018        PMID: 29320418      PMCID: PMC5795761          DOI: 10.3390/s18010176

Source DB:  PubMed          Journal:  Sensors (Basel)        ISSN: 1424-8220            Impact factor:   3.576


1. Introduction

Recently, cloud computing has become a very fascinating computing paradigm, in which storage and computation have moved away from terminal devices to the remote side. There are many novel applications in this area, such as outsourcing computation [1,2] and outsourcing verification [3]. This new and popular method brings important revolutions for the management, distribution and sharing data of enterprises and individuals, especially for some constrained devices, such as mobile phone, wireless sensors. Cloud clients (or sensors) are able to achieve significant cost savings by outsourcing their data storage and computation to some cloud service providers. Since the data of cloud clients (or sensors) are out of control by themselves, how to ensure the data security of cloud clients (sensors) is a significant problem in academia and industrial. Utilizing all kinds of cryptographic schemes is an essential method to achieve this goal. While attribute-based encryption (ABE) [4] is one of the most popular notions to study and utilize in cloud computing since it has the property of the flexible and fine-grained access control. The notion of ABE was first introduced by Sahai and Waters [4]. There are two different types of ABE schemes according to the manner to deploy the access control policy, key-policy attribute-based encryption (KP-ABE) [5] and ciphertext-policy attribute-based encryption (CP-ABE) [6]. The ciphertexts are labeled with sets of attributes and access policies over these attributes are associated with clients’ private keys in the KP-ABE scheme. While every ciphertext is associated with an access policy, and every client’s private key is associated with a set of attributes in the CP-ABE scheme. However, decryption operations of most requirement that the set of attributes should satisfy the access policy in any ABE system and in most existing ABE schemes, one of the main drawbacks is that the length of the ciphertext and the decryption computational cost grow with the complexity of the access policy. This becomes critical obstacle in various applications, especially the applications on resource-limited devices. In order to reduce the decryption time and the computation cost, Green et al. [7] proposed an ABE scheme with outsourced decryption (ABE-OD). In their scheme, an authorized client first delegated an untrusted cloud server to convert the original ciphertext into a transformed ciphertext with a transformation key, and then the client obtained the plaintext from the transformed ciphertext by spending a small overhead. The ABE-OD scheme would not leak any information about the encrypted data. However, the ABE-OD proposed by Green et al. cannot ensure the correctness of the transformed ciphertext since the cloud server is public and untrusted. The untrusted cloud server may send a wrong transformed ciphertext to the clients for saving computing cost or suffering from malicious attack which also causes to generate the incorrectly transformed ciphertext. In order to ensure the correctness of the ciphertext, Lai et al. [8] put forth an ABE-OD scheme that can check the correctness of the transformed ciphertext generated by the cloud server, which was called ABE with verifiable outsourced decryption (ABE-VOD). In their ABE-VOD scheme, the data owner encrypted a plaintext and a random message to the ciphertext respectively, and generated a commitment of an actual plaintext and the random message. And in the decryption algorithm of their ABE-VOD scheme, the client should compute the plaintext and the random message to use the commitment to verify whether the transformed ciphertext is generated correctly. A client was able to verify the correctness of the transformed ciphertext if and only if his/her attributes set satisfies the access structure associated with the ciphertext. Subsequently, several ABE-VOD schemes were proposed according to different methods and distinct scenarios in [9,10,11,12,13]. And Qiu et al. [14] used an ontology-based approach to achieve attribute-based access controls as well. Recently, Li et al. [15] proposed a full verifiability for outsourced decryption in ABE, which could simultaneously check the correctness of transformed ciphertext for the authorized clients and unauthorized clients. In their scheme, a data owner constructed two access policies for the authorized clients and unauthorized clients, respectively. And then the data owner uses a short “signature” for each ciphertext to ensure that the client could verify the validity of the transformed ciphertext. In order to avoid first computing the plaintext and then verifying the validity of the ciphertext, Li et al. used “verify-then-decrypt” skill rather than “decrypt-then-verify” paradigm. That is to say, the client first verified the validity of the ciphertext or the transformed ciphertext, and then decrypted the ciphertext and obtains the corresponding plaintext or the random message if the ciphertext or the transformed ciphertext passed the verification of its validation.

1.1. Motivation and Contribution

In cloud computing, the ABE-OD scheme cannot ensure the correctness of the ciphertext or the transformed ciphertext for cloud server being untrusted. The untrusted server may send a wrong transformed ciphertext to the users for saving computing cost or it may have suffered from malicious attack which also produces the incorrect ciphertext or transformed ciphertext. In order to ensure the correctness of the ciphertext or the transformed ciphertext, the ABE-VOD schemes were proposed in [9,10,11,12,13,15]. However, we firstly show that the validity verification method in decryption algorithm of the ABE-VOD scheme put forth by Li et al. [15] cannot always check the validity of all ciphertexts in this paper. That is to say, there exist some invalid ciphertexts which can pass the validity checking and output the “corresponding” plaintexts. Furthermore, even if the untrusted server honestly performs the outsourced decryption for these invalid ciphertexts, the decryption algorithm cannot check them (the decryption algorithm cannot output ⊥). Thus, the “verify-then-decrypt” skill used in [15] is unavailable. Then, we show that the method to check the validity of the outsourced decryption for the authorized user via checking it for the unauthorized user is not always correct. That is to say, there exist some invalid ciphertexts which can pass the validity checking for the unauthorized user, but cannot pass the correctness of the ciphertexts checking for the authorized user.

1.2. Organization of the Paper

The rest of this paper is organized as follows. The system model of the ABE-VOD and some basic mathematic knowledge are introduced in Section 2. In Section 3, we review the ABE-VOD scheme proposed by Li et al., and analyze their scheme. Finally, the conclusions are given in Section 4.

2. Premilinary

In the section, we will recall the definition of ABE-VOD and some basic mathematic knowledge in [15].

2.1. System Model

The ABE-VOD Scheme consists of seven algorithms: Setup, KeyGen, Encrypt, Decrypt, GenTK Transform and Decrypt The detailed is described as follows. Setup Take as input a security parameter and attribute universe description generate a master secret key and public parameters KeyGen Take as input the master secret key the public parameters and an attribute set generate the client’s private key If a client is an authorized one, use to represent the private key of the authorized client, where represents an attribute set of the authorized client. If a client is an unauthorized one, the client uses to represent the private key of the unauthorized client, where represents an attribute set of the unauthorized client. Encrypt Take as input the public parameters the plaintext M and two access structures and output a ciphertext Decrypt Take as input a private key and a ciphertext If the client’s attribute set S satisfies the access policy then the client utilizes the private key to decrypt the ciphertext; otherwise, the client utilizes the private key to decrypt the ciphertext. After the client checks the correctness of the ciphertext, he/she outputs the plaintext M if the ciphertext is valid; otherwise, the client outputs GenTK Take as input the public parameters and the private key genetate a transformation key and a retrieving key If a client is an authorized one, let and set otherwise, let and set Transform Take as input the transformation key and the ciphertext generate the transformed ciphertext Decrypt Take as input a ciphertext a transformed ciphertext and a retrieving key If the client’s attribute set S satisfies the access policy the client is an authorized one and then he/she utilizes and to decrypt the ciphertext; otherwise, the client utilizes the private key and to decrypt the ciphertext. After the client checks the correctness of the ciphertext, outputs the plaintext M if the ciphertext is valid; otherwise, outputs

2.2. Bilinear Pairing

Let and be two multiplicative groups which have the same prime order be the multiplicative group of the finite field A bilinear map [16], which satisfies the followings three properties: Bilinearity: For any Non-degeneracy: There are elements such that where 1 is the identity element of . Computability: For any elements there is an efficient algorithm to compute The concrete bilinear pairings e will be using the modified Weil [17] or Tate pairings [18] on some elliptic curves. We will define two hard problems used in our paper below: Decisional Diffie-Hellman (DDH) problem and Computational Diffie-Hellman (CDH) problem. Let be a generator of the group (CDH problem in Given , to compute (DDH problem in Given , to decide whether holds or not. It is obvious that the DDH problem in is easy since it can verify above congruence by using the bilinear pairing e. However, as far there is no polynomial-time algorithm to solve CDH problem in , we assume that CDH problem in is hard.

2.3. Linear Secret Sharing Schemes

We recall a description for LSSS in [19]. Let be a set of parties. A secret sharing scheme is called linear (over ) if it satifies the following conditions. The secret shares of each party form a vector in Let A is a matrix with l rows and n columns. Let the function represent the party labeling row i as where is the ith row of Suppose a vector is the column vector and are random value in where is the secret to be shared. is the vectors of l shares for the the secret s with respect to The share belongs to party Suppose that is an LSSS of the access policy and is any authorized set. Let If are valid shares for any secret s with respect to then we can compute constants such that where Notations. The vector is the “target” vector of any LSSS. For any unauthorized set of rows I in the target vector is not in the span of the rows of set For any authorized set of rows I in the target vector is in the span of

3. Analysis of Li et al.’s Abe-Vod Scheme

Since ABE-VOD scheme proposed by Li et al. is much complex, we recall it in Appendix B and the security model in Appendix A.

3.1. The Excepted Functionalities of the ABE-VOD Scheme

In the subsection, we analyze the construction of the ABE-VOD scheme proposed by Li et al. The scheme wanted to get the following results at least. First, any ABE-VOD should have the decryption functionality. The decryption algorithm of the ABE-VOD can correctly check the valid ciphertext and invalid ciphertext (any encryption scheme must satisfy this condition). That is to say, the Decrypt algorithm outputs a corresponding plaintext of some ciphertext if and only if the ciphertext is valid, or the Decrypt algorithm outputs the corresponding plaintext of a transformed ciphertext if and only if the transformed ciphertext is correct. Then, the ABE-VOD scheme can simultaneously check the correctness of the transformed ciphertext for the authorized users and unauthorized users by using “verifying-then-decrypt” method to guarantee the correctness of the transformed ciphertext.

3.2. The ABE-VOD Scheme Cannot Verify the Validity of All Ciphertexts

In general, the goal of the verification formulas of the decryption algorithm are to check the correctness of ciphertext. However, the decryption algorithm of ABE-VOD scheme proposed by Li et al. only checks validity of a part of ciphertext, but not checks whether the output of the decryption algorithm for some ciphertext is the original plaintext . In the subsection, we show that there exist some ciphertexts which are verified by the decryption algorithm, but its output isn’t the original plaintext. As analysis in [15], the ciphertext stored in cloud server maybe be tampered by some malicious attackers or the transformed ciphertext could be generated via using incorrect one by the untrusted cloud server. We will view these activities as attacks of an adversary and describe how an adversary constructs an invalid ciphertext below, which the decryption algorithm will view as a valid ciphertext and output the “corresponding” plaintext. The adversary takes as input a random message and the two LSSS access structures = , = The adversary first picks up a random string two random vectors and and two random elements such that and For each row of A, of , it picks uniformly at random. Then, it calculates: Set and compute: Set The ciphertext Obviously, the ciphertext is not a valid ciphertext of the message M since the adversary picks two distinct random numbers and to produce the ciphertext , and picks two distinct random numbers and to produce the ciphertext . However, the decryption algorithm will view it as a valid ciphertext and output the “corresponding” plaintext. When the decryption algorithm takes as input and it runs as follows. If S satisfies the access policy , the private key of an authorized client is Let Then it calculates for such that = and computes: which equals It is clear that the equality holds, where Then it computes However, does not equal M since That is to say, the decryption algorithm cannot refuse the plaintext of the ciphertext which is produced by other “encryption” algorithm. If S satisfies the access policy , the private key of an unauthorized client is Let Then it calculates for such that = and computes: which equals For the same reason above, the equality holds, where Then it computes However, does not equal R since Thus, the decryption algorithm of the ABE-VOD scheme proposed by Li et al. for both the authorized client and the unauthorized client cannot check the validity of all ciphertexts. I.e., there exist some invalid ciphertexts which can pass the validity checking. Furthermore, their ABE-VOD scheme cannot check the validity of the outsourcing computation by checking the correctness of the corresponding ciphertext since the output of both the Decrypt algorithm and Decrypt algorithm is not always correct.

3.3. The ABE-VOD Scheme Is Not Full Verifiable

Since verifying the correctness of the outsourced decryption for unauthorized clients is very important, Li et al. considered the following scenario. The authorized user wants to, but is not able to, process some pending businesses when the time or position of the authorized client is limited. He/she needs someone to help him/her to verify whether a pending business is correctly processed and does not want the latter to know anything about the content of the business. Thus Li et al. proposed the ABE-VOD scheme which could utilize an unauthorized client to help him/her to verify the correctness of the transformed ciphertext. We construct the following ciphertext which can pass the correctness checking for an unauthorized client but it is not a valid ciphertext for the authorized client. The adversary takes as input a random message and the two LSSS access structures = , = The adversary first picks a random string two random vectors and For each row of , it picks uniformly at random. And it uniformly picks at random. Set , then it calculates: Set The ciphertext It is clear that if S satisfies the access policy the authorized client cannot pass the checking of the correctness of the ciphertext. Because the elements are random elements, which is a valid ciphertext with a negligible probability. That is to say, since the equation with negligible probability for random elements is a valid signature of with negligible probability. We use the decryption algorithm to check the equality which holds with negligible probability for random elements However, if S satisfies the access policy the unauthorized client can pass the correctness checking of the ciphertext. Because the adversary uses the Encrypt algorithm to encrypt the message R for the unauthorized client. The equations hold. That means always holds. Thus, the decryption algorithm can output plaintext R correctly. Especially, when the untrusted server honestly runs the Transform algorithm, the unauthorized client can always pass the correctness checking of the transformed ciphertext. Thus, the ABE-VOD scheme cannot verify the correctness of the ciphertext or the transformed ciphertext for the authorized user via verifying it for the unauthorized user.

3.4. Furthermore Analysis

We have showed that the decryption algorithm cannot satisfy two functionalities, checking the correctness of all ciphertexts and “full verifiable” above. Next, we will explain the reason and possibly reasonable method. On one hand, the construction of the above ABE-VOD scheme utilized ABE-OD scheme proposed by Green et al. [7] and short signature scheme proposed by Boneh et al. [16]. The one-time signature of a “message” (or of a “message” ) is unforgeable and it also ensures that or holds if and only if and are valid signatures of (or and ) under public key and respectively. However, there is no condition that guarantees the validity of and That is to say, we can choose any random element as (or ). Thus, the above adversary can construct an invalid or but the ciphertext can be verified as a valid ciphertext. It seems that the method to sign a part of the ciphertext cannot guarantee all invalid ciphertexts to be refused. It needs another secure mechanism to guarantee the part of the ciphertext is valid. On the other hand, from the unauthorized client’s view, is a random element in which is independent of and Thus, the unauthoized client has no capability to verify the validity of and the construction in [15] cannot check the correctness of the ciphertext and the transformed ciphertext for the authorized users by checking the validity of the ciphertext and the correctness of the transformed ciphertext for the unauthorized clients.

4. Conclusions

In this paper, we showed that the validity verification method in decryption algorithm of the ABE-VOD scheme put forth by Li et al. cannot always check the validity of all ciphertexts. There exist some invalid ciphertexts which can pass the validity checking and the “verify-then-decrypt” skill used in [15] is unavailable. Then, we showed that the method to check the validity of the outsourced decryption for the authorized client via checking it for the unauthorized client was not always correct. There exist some invalid ciphertexts which can pass the validity checking for the unauthorized client but cannot pass the validity checking for the authorized client. Finally, we pointed out that although the scheme used signature skill to guarantee the ciphertext cannot be tampered, the signing key of the “signature scheme” used in the encryption scheme was not fixed and anyone can generated it. That caused our constructions.
  1 in total

1.  Secure Data Access Control for Fog Computing Based on Multi-Authority Attribute-Based Signcryption with Computation Outsourcing and Attribute Revocation.

Authors:  Qian Xu; Chengxiang Tan; Zhijie Fan; Wenye Zhu; Ya Xiao; Fujia Cheng
Journal:  Sensors (Basel)       Date:  2018-05-17       Impact factor: 3.576

  1 in total

北京卡尤迪生物科技股份有限公司 © 2022-2023.