Outsourcing the decryption of ciphertexts for predicate encryption via pallier paradigm

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

With the proliferation of computation and storage outsourcing, access control has become one of the vital problems in cloud computing. Supporting more complex and flexible function, predicate encryption (PE) is gaining more and more attention in access control of decryption outsourcing. Based on the somewhat homomorphic encryption Paillier scheme and combined with Green’s scheme which supports outsourcing the decryption ciphertexts, we constructed a Paillier type outsourcing the decryption ciphertexts via predicate encryption. In this scheme, decryption can be outsourced to the cloud, and which can greatly reduce the storage and computation costs of user end. Moreover, the scheme supports arbitrary homomorphic addition and one homomorphic multiplication on ciphertexts. IND-AH-CPA security of the scheme is proved under subgroup decision assumption.

Cite

CITATION STYLE

APA

Ping, B., Wei, Z., Zhenlin, L., & Wang, X. A. (2018). Outsourcing the decryption of ciphertexts for predicate encryption via pallier paradigm. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 6, pp. 199–211). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-319-59463-7_20

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free