Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks

Changhee Hahn, Jongkil Kim

Research output: Contribution to journalArticlepeer-review

3 Scopus citations

Abstract

Cloud-based Internet of Things (IoT) management services can be utilized to acquire data from devices at any point on Earth. Accordingly, controlling access to data managed by possibly untrusted cloud servers is crucial. Attribute-based encryption (ABE) provides flexible access control and the capability to delegate, facilitating decryption operations with high computationally costs to be outsourced to cloud servers. Earlier studies discussed guarantees to the accuracy of delegated computation through various cryptographic encoding techniques, thus helping data receivers verify the precision of outsourced decryption operations. In this article, we investigate two state-of-the-art schemes addressing verifiable outsourced decryption of encrypted data, and show their vulnerability to our verification bypassing attacks. We then propose a securitywise enhanced encoding scheme that disables such attacks. In addition, a rigorous security analysis is conducted, demonstrating the capabilities of the proposed scheme against bypassing attacks. An experimental analysis finds that the method proposed in this article outperforms the two state-of-the-art works by 82% and 87%, respectively, on the encoding computation cost.

Original languageEnglish
Pages (from-to)22559-22570
Number of pages12
JournalIEEE Internet of Things Journal
Volume9
Issue number22
DOIs
StatePublished - 15 Nov 2022

Bibliographical note

Publisher Copyright:
© 2014 IEEE.

Keywords

  • Cloud computing
  • encryption
  • privacy
  • security

Fingerprint

Dive into the research topics of 'Verifiable Outsourced Decryption of Encrypted Data From Heterogeneous Trust Networks'. Together they form a unique fingerprint.

Cite this