Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary

Go Ohtake, Reihaneh Safavi-Naini, Liang Feng Zhang

2017

Abstract

Integrated broadcast-broadband services allow viewers to simultaneously receive broadcast content over the airwaves and additional information related to the content over the Internet. This integration provides opportunities for new services to be tailored and offered to individual viewers. Viewing histories provide a rich variety of data for service providers to learn the preferences of individual viewers and fine-tune their offerings. Each person’s viewing history, however, is privacy-sensitive data and may reveal information that the viewer does not want revealed. In this paper, we propose a system that allows viewers to specify a policy that they would like to be applied to their viewing history, when shared with service providers, by using attribute-based encryption (ABE). A ciphertext is associated with a policy, and it can be decrypted only by service providers who conform to the policy. To reduce the computations of the user terminal, we develop a system with provable security that allows the encryption to be outsourced to a cloud server, without the need to trust the cloud server. Although our solution is described for integrated broadcast-broadband services, the architecture and results could also be used for sharing viewing histories of services such as Netflix. We implemented our scheme and showed that it significantly reduces the computation cost of a user terminal.

Download


Paper Citation


in Harvard Style

Ohtake G., Safavi-Naini R. and Zhang L. (2017). Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary . In Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-209-7, pages 71-82. DOI: 10.5220/0006129600710082

in Bibtex Style

@conference{icissp17,
author={Go Ohtake and Reihaneh Safavi-Naini and Liang Feng Zhang},
title={Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary},
booktitle={Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2017},
pages={71-82},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0006129600710082},
isbn={978-989-758-209-7},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 3rd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Outsourcing Scheme of ABE Encryption Secure against Malicious Adversary
SN - 978-989-758-209-7
AU - Ohtake G.
AU - Safavi-Naini R.
AU - Zhang L.
PY - 2017
SP - 71
EP - 82
DO - 10.5220/0006129600710082