Wireless body area network includes some tiny wearable sensors for monitoring the physiological data of user, which has been a promising method of promoting the quality and efficiency greatly in healthcare. The collected physical signs are aggregated into the medical documents and uploaded to cloud server for utilizing by the remote user. As these files are highly sensitive privacy data, there is a vital challenge that constructs a secure and efficient communication architecture in this application scenario. Based on this standpoint, we present a lightweight verifiability ciphertext-policy attribute-based encryption protocol with outsourced decryption in this article. Specifically, our construction enjoys the following six features: (1) Although the outsourced decryption enables to save the computation overhead of the data user sharply in an attribute-based encryption scheme, the ciphertext is out of control and the correctness cannot be guaranteed by the data owner. The proposal provides the verifiability of ciphertext that ensures the user to check the correctness efficiently. (2) The size of the ciphertext is constant that is not increased with the complexity of attribute and access structure. (3) For Internet of Things devices, it introduces the fog computing into our protocol for the purpose of low latency and relation interactions, which has virtually saved the bandwidth. (4) With the help of blockchain technique, we encapsulate the hash value of public parameter, original and transformed ciphertext and transformed key into a block, so that the tamper-resistance is facilitated against an adversary from inside and outside the system. (5) In the standard model, we prove that it is selectively chosen-plaintext attack-secure and verifiable provided that the computational bilinear Diffie–Hellman assumption holds. (6) It implements this protocol and shows the result of performance measurement, which indicates a significant reduction on communication and computation costs burden on every entity in wireless body area network.
Internet of Things (IoTs) connect physical devices on Internet, including sensor nodes, smart terminals, and other wireless communication equipments.1–3 As a main application of IoTs, the wireless body area network (WBAN) has attracted a tremendous attention recently.4–6 WBAN consists of various wearable intelligent sensors on the body, which are connected in the form of wireless communication link. The sensors in WBAN provide the constant health monitoring (for example, the heart beat, the body temperature, the blood pressure, and electrocardiogram), and real-time feedback to the data user (DU) or medical staff. Taking advantages of WBAN, the patient enjoys a promising physical mobility and experiences a high-quality healthcare service at home. In addition, these collected physiological data are uploaded to the cloud platform for being utilized by the DU.
As a distributed computation model over a shared pool, cloud computing provides infrastructure as a service like physical computing resources, data partitioning, storage, and so on.7–9 In the cloud paradigm, the user just pays for enjoying the corresponding cloud services supported by the cloud service provider (CSP) instead of managing and maintaining the infrastructure, which reduces the local storage overhead and provides the convenient data access service. Uploading the physiological data in WBAN to cloud platform, it realizes the real-time data sharing, the elastic computation resource distribution and the accurate response in time. However, the data owner (DO) loses the capacity of controlling over it physically after being stored on the cloud platform, and the physiological data contains some sensitive privacy. Therefore, it is essential to implement the confidentiality protection with access control against the unauthorized user and curious CSP.
For enjoying the confidentiality and access control in cloud, the attribute-based encryption (ABE) scheme was proposed as a preeminent cryptographic primitive.10 ABE is an one-to-many encryption mode that the authorized entity is able to decrypt the protected data only if the access structure and attribute attached with private key and ciphertext. Moreover, this scheme is divided into two types, key-policy ABE (KP-ABE) schemes11–13 and ciphertext-policy ABE (CP-ABE) schemes.14–17 In the former, the private key is related to designated policies, while the ciphertext is labeled by some attributes. The user decrypts this ciphertext successfully unless these access policies are met by some attributes of such ciphertext, which reflects the permission of this user. On the contrary, in the latter, the ciphertext is associated with access policy, while some attribute sets are embedded into private key. CP-ABE scheme shows some requirements for the decryptor. In the cloud-assisted WBAN, the physiological data are stored on the cloud storage server (CSS), and shared among the authorized DUs. Consequently, it is more practical to adopt CP-ABE scheme to support confidentiality and access control in the cloud-assisted WBAN. Unfortunately, in the CP-ABE scheme, there is a shortcoming that the overhead is expensive due to the complexity of access structure in the phase of decryption, which impedes the application of ABE in IoTs device with limited resource.
For decreasing the computation overhead of decryption burdened on the DU, the concept of outsourced decryption was presented.18 Concretely, a ciphertext and a transformation key are given to CSS, and it transforms this ciphertext into a partial one, rather that is directly decrypted by the DU. The user only spends a little cost in accessing the plaintext from this partial ciphertext. Nevertheless, the validity of this transformed ciphertext cannot be ensured for an untrusted CSS. Some curious CSS may distort and tamper the transformed ciphertext. Therefore, the verifiability of the transformed ciphertext is necessary for the outsourced decryption ABE.19
Moreover, the blockchain technique is a desirable method of resisting the data tampering as well.20,21 Blockchain technology is a backbone of the Bitcoin cryptocurrency,22 which is considered as a peer-to-peer distributed ledger technology to record data. The distinguishing features of this technology are decentralized maintenance, secure transporting and accessing the data as well as anti-tamper and undeniability. Taking blockchain into outsourced decryption ABE protocol, the ciphertext, the partial ciphertext, the transformation key, and other important parameters are encapsulated into a block chronologically, which avoids to be tampered from any entity, including the inside and outside adversary.
At the same time of enjoying the convenience, the cloud-assisted IoTs also suffers from the huge network latency, the massive data, and other various drawbacks.23 To avoid these drawbacks, one of the preeminent technique measure is fog computing. As shown in Figure 1, fog computing is presented for extending the cloud service to the edge of the IoTs,24–26 which promotes the resources and services to be closer to the IoTs devices. In the face of the explosion of data in IoTs, fog computing enables to provide small latency and real-time application.
The underlying structure of fog computing.
Related works
ABE is a popular topic that enjoys the confidentiality and fine-grained access control. However, the weakness of original ABE scheme is that it needs some expensive operations in decryption, and the overhead is related to the complexity of access structure. Green et al.18 introduced the model of ABE with outsourced computing to reduce the computational cost in decryption, which transformed the decryption operation to CSS and reduced the overhead of the DU significantly. Unfortunately, the correctness of transformed ciphertext in Green et al.18 cannot be checked. Lai et al.19 presented a verifiability ABE protocol with outsourced decryption to verify the validity of the transformed ciphertext. To improve the efficiency, Lin et al.27 combined an attribute-based key encapsulation mechanism (KEM), a commitment protocol, and a symmetric key encryption scheme to achieve efficient verifiability. Moreover, they also put forward a unified model for outsourced decryption ABE with verifiability. Qin et al.28 encrypted the data in symmetric encryption, and this symmetric key is encrypted under ABE scheme. By comparing the hash values, this protocol realized the verification of the outsourced ciphertext in correctness. Mao et al.29 designed an improved verifiability ABE protocol with outsourced decryption to cut down the size of ciphertext and computational cost obviously, which committed to such plaintext by means of a random parameter. The scheme in Li et al.30 gave a novel verifiable outsourced decryption of ABE scheme that the size of ciphertext is constant, which not only verified the validity of transformed ciphertext, but also made the overhead be irrelevant to the complexity of access structure. Li et al.31 introduced an ABE protocol with fully verifiable oursourced decryption as well, and all the users (including authorized and unauthorized) enabled to check the correctness of transformed ciphertext. Recently, the scheme in Li et al.32 demonstrated an verifiability ABE with outsourced computing in both the encryption and decryption phases. This protocol caused the cost of transformed key generation to be constant and shifted the burden on both the DO and user.
Furthermore, the blockchain technology is also employed to guarantee the validity of the outsourced data. If only encapsulated the vital parameters into a block, any entity (including the authorized user and trusted or curious authority from inside, and the unauthorized user and adversary from outside) could not tamper these data. Guo et al.33 encapsulated the electronic health records (EHRs) in blockchain to guarantee the validity in the attribute-based cryptography primitive, every patient endorsed a message according to his attribute for avoiding to reveal his or her privacy. For applying in distribution system, the protocol in Guo et al.34 demonstrated a multi-authority ABE for medical data. Taking advantage of the blockchain technique, the integrity of these private data in cloud is protected. Liu et al.35 adopted the CP-ABE to provide strong privacy preservation in data sharing. Moreover, the index of physiological data is stored in the blockchain, which ensured that such sensitive data could not be modified arbitrarily. The schemes36–39 are all focused on the integrity and correctness of the outsourced data in cloud depending on the blockchain technology.
Although ABE scheme with outsourced decryption reduces the cost significantly, the mass data processing from sensor nodes is still greatly hindering the application of resource-limited IoT devices. Taking cloud-fog architecture into consideration, fog node (FN) is likely to be a proxy that executes partial computation. With the assistance of FN, it will need less calculation cost on the resource-limited IoT device. In the environment of fog computing, Zuo et al.40 first presented the chosen-ciphertext attack (CCA)-secure model in ABE with outsourced decryption. Integrating CP-ABE and searchable encryption, Miao et al.41 proposed an efficient fine-grained ciphertext searching system, which shifted partial computation overhead from the DU to the selected FN. Fan et al.42 introduced an access control scheme with multiple authorities for privacy preservation in the fog-assisted IoT architecture, which operated the verifiable outsourced decryption by FN and ensured a real-time application. Considering the computing capacity of the sensor node, Wang et al.43 presented a fine-grained access control with distributed outsourced computing, in which the receiver and sender just executed little calculation with the help of the FN.
Contributions
To this article, for preserving the privacy in WBAN, a lightweight verifiability CP-ABE protocol with outsourced decryption is presented. The contributions of our protocol are listed as following.
By adding verification algorithm in decryption, this scheme enjoys the verifiability of ciphertext to check the correctness by the DU. Moreover, depending on the blockchain technology, it encapsulates the important data into a block chronologically and protects these data from being tampered by inside and outside adversary.
The size of ciphertext is constant that is independent with the complexity of attributed set and access policy. Moreover, FN affords partial computation and storage task that cuts the cost of IoT device equipped by the DO.
Provided that the assumption of computational bilinear Diffie–Hellman (CBDH) holds, we formally prove this proposal is verifiable in the standard model, and selectively chosen-plaintext attack (CPA)-secure.
As for simulation and comparison, we implement our constrution and demonstrate the result of performance measurement, which indicates a significant reduction on the bandwidth of communication and computation for every entity in this protocol.
Organization
The remaining paper is organized as follows. Section “Preliminaries” introduces some basic knowledges and concepts, such as the notions of bilinear map, security assumption and access structure, the definition and security model of verifiability CP-ABE scheme with outsourced decryption in this article. Section “The architecture of system model” describes the detailed characters in our system model. Section “Our construction” presents our concrete CP-ABE scheme with verifiable oursourced decryption for WBAN. Section “Security analysis” proves the security and verifiability of this proposal. Section “Performance evaluation” demonstrates the experimental results on the performance comparison with the related schemes. Finally, Section “Conclusion” states our conclusions of such article.
Preliminaries
In this part, some preliminary knowledges regarding the cryptographic primitives that our scheme depends on are introduced.
Bilinear map
Suppose that and are bilinear cyclic groups with the prime order . A bilinear map possesses the following three properties:
Bilinearity: ∀, , holds.
Non-degeneracy: It exists such that .
Computability: ∀, it exists an efficient algorithm to calculate .
Complexity assumption
Let be a finite cyclic group with prime order , and be selected uniformly at random. The difficult problem underlying the security of our protocol are shown as below.
Definition 1
CBDH problem
Given a tuple of elements , the CBDH problem in is to calculate the bilinear pairing .
The CBDH assumption in is that there is no probabilistic polynomial-time (PPT) algorithm to solve CBDH problem successfully with non-negligible advantage. The advantage of is defined as
where this probability is over the randomly chosen tuple of .
Access structure
Definition 2
Access structure
Suppose that is a set of parties. There is a monotone collection , where if , for any and . Moreover, the access structure (respectively, monotone access structure) is called a collection (respectively, monotone access structure) of non-empty subsets of , that is, . Hence, the set belonging to is an authorized set. Otherwise, it is unauthorized.
Formal definition of CP-ABE with outsourced decryption
The CP-ABE scheme with outsourced decryption consists of seven algorithms as follows.
: This algorithm inputs security parameter , and then it outputs the public parameters and master secret key of this system.
: This algorithm inputs the public parameters , master secret key , and an attribute set . Then, returns as a private key for .
: This algorithm inputs public parameters , a message and an access policy , and then it returns the ciphertext of as an answer.
: This algorithm inputs the public parameters , the private key for and the ciphertext , and then it returns as an answer if satisfies the access structure .
: This algorithm inputs the public parameters and the private key for attribute set , and then it returns a transformation key and a retrieving key correspondingly as an answer.
: This algorithm inputs the public parameters , the ciphertext , and the transformation key for , and then it returns a partial ciphertext as an answer.
: This algorithm inputs the public parameters , the ciphertext , the partial ciphertext , and the retrieving key , and then returns message as an answer.
Security model for CP-ABE with outsourced decryption
Confidentiality
As the traditional CCA-secure does not permit any changes on bits of ciphertext, which is not suitable for the above model of CP-ABE with outsourced decryption. Thus, it proposes the selectively CPA-secure model in the following game between a challenge and an adversary .
Init: The adversary submits as a challenge access policy.
Setup: The challenger selects a security parameter for executing Setup, and then it returns the public parameters to and keeps master secret key secretly.
Query Phase 1: Challenger maintains an empty list and a set E. Adversary issues two queries as below.
Private-Key-Extraction: Adversary queries this oracle on the attribute set , and the challenger executes KeyGen and sets E=E. It outputs the private key to , and it cannot make this query for the private key that satisfies the challenge access structure .
Transformation-Key-Extraction: Adversary launches this query on attribute set . The challenger searches from the list . If such tuple exists, outputs to . Otherwise, the challenger executes KeyGen and GenTKout, and stores the generated tuple in the list . At last, it returns transformation key to . In addition, if it has queried Private-Key-Extraction based on , is forbidden to make queries on Transformation-Key-Extraction for the same set .
Challenge: Adversary submits two messages and with the same length, and a challenge access policy that cannot be satisfied by . randomly selects and calculates . After that, returns the challenge ciphertext to .
Query Phase 2: The adversary continues to make the same queries on Private-Key-Extraction and Transformation-Key-Extraction as in Query Phase 1. However, the private key should not meet the challenge access policy .
Guess: Adversary returns its guess on . If , wins the game.
The advantage of in this game is defined as
Definition 3
This verifiability CP-ABE protocol with outsourced decryption is selectively CPA-secure if the advantage of all the PPT adversaries is negligible in the above security model.
Verifiability
The verifiability for CP-ABE protocol with outsourced decryption is proposed by the interaction between adversary and challenger in the following.
Init: Adversary submits as a challenge access policy.
Setup: Challenger operates Setup to generate the public parameters and the master secret key . After that, it returns to adversary.
Query Phase 1: Adversary queries on Private-Key-Extraction and Transformation-Key-Extraction as in Query Phase 1 of the above security game.
Challenge: Adversary submits a message and a challenge access structure to , it calculates and reponses it to as a challenge ciphertext.
Query Phase 2: The adversary adaptively launches the query in Query Phase 1.
Output: Adversary returns attribute set and transformed ciphertext . We suppose that the tuple is included in the list . Otherwise, generates this tuple by querying on Private-Key-Extraction and Transformation-Key-Extraction. wins this game if . Moreover, the advantage of in above model is defined as
Definition 4
Verifiability
This CP-ABE scheme with outsourced decryption is verifiable, if the advantage for all PPT adversaries is negligible.
The architecture of system model
The architecture of this system consists of the DO (such as patient), the FNs, the CSS, the trusted authority (TA) and the DU (such as doctor and researcher). The relationship between them is described in Figure 2 and elaborated as follows.
The system model of blockchain-enabled WBAN in fog computing.
DO in this system is considered as a patient, who enjoys the medical monitoring service from CSP. The wearable IoT devices collect the physiological data and medical images of the patient in WBAN, such as electrocardiograph (ECG), physical status video (PSV), blood pressure (BP), and so on. And then, these data are delivered to a collection device by the wireless network. Since the physical data are sensitive privacy information, for the sake of protecting the medical data and realizing fine-grained access control, DO designs an access policy that is used to encrypt the data under the verifiable outsourced decryption CP-ABE scheme with public system parameter acquired from TA. After that, the encrypted data is uploaded to the FN via Internet.
FN are located on the edge of network, which has the ability of computing, transmitting, and temporarily storing the medical data. There are three primary missions in our proposal. First, FN is in charge of retransmitting the ciphertext from DO to CSS. Second, after receiving the transformation key from DU, FN computes the transformed ciphertext and returns it back to DU. Third, FN manages and maintains a blockchain that stores the hash value of a public parameter , a transformation key , a ciphertext , and a transformed ciphertext in every encrypting into a block chronologically. Depending on the purpose of anti-tamper, all the data stored in the blockchain will never be distorted by anyone. Specifically, according to this mode, any variations on this key or ciphertext would change the corresponding hash value in the blockchain, and all the entities in this system will perceive these variations. Consequently, blockchain is beneficial for protecting integrity in a verifiable and permanent method from inside and outside adversary.
CSS owns considerable storage space and calculation capability, which supplies outsourced storage and computation service to the customers. In this system, CSS is responsible for storing the outsourced data from DO in the form of ciphertext, which could be accessed by DU.
TA is a system parameter generator center, whose responsibility is generating the public parameters and master secret key, and distributing secret key to the registered DO and DU. Furthermore, it executes Setup and KeyGen algorithms as well.
DU represents the medical staff for diagnosis, the researcher for medical science and the relatives for solicitude, and so on. Each of registered user accepts the attribute secret key relying on its characteristics. If their attributes meet the access policy of DO, DU enables to access his or her medical data. In detail, after receiving the partial encrypted medical file (i.e. the transformed ciphertext ) from FN, DU downloads the ciphertext from CSS for verification and decryption by taking advantage of attribute secret key and transformation key pair to achieve the accurate plaintext medical data.
Our construction
In this section, it lists some employed notations in Table 1. Furthermore, it designs seven concrete algorithms that are demonstrated in the following.
: TA takes as input, it selects a bilinear map , where and are additional and multiplicative cyclic groups with prime order . Let be a generator of , TA chooses randomly and calculates . Then, it picks two collision resistance hash functions and . At last, TA returns the public parameters and master secret key .
: Considering that is linear secret sharing scheme (LSSS) for an access policy ,30 Att is an authorized attribute set and . Then, it obtains shares of the secret , and denotes the party corresponding to shares as , where is the attribute underlying . For the different Att and Att′, holds. TA computes , , and sends to DU with attribute Att.
: To encrypt , it first selects and . Next, DO computes
Notions and meanings.
Notions
Meanings
The additional cyclic group with prime order .
The multiplicative cyclic group with prime order .
The generator of .
The collision resistance hash function .
The public parameters of this system.
The master secret key of this system.
Att
The authorized attribute set.
The number of attribute in Att.
The private key of user with attribute Att.
The transformation key of user with attribute Att.
The retrieving key of user with attribute Att.
After that, it returns the ciphertext
: Input the private key and ciphertext , DU calculates as follows
Then, it computes and . At last, if holds, it outputs the message . Otherwise, outputs ⊥ and aborts.
: This algorithms takes the private key as input, DU generates its transformation key pair by choosing randomly and computing as a pair of transformation key, and as a retrieving key.
: Given ciphertext and transformation key , FN computes as belows
Outputting the transformed ciphertext as
: DU downloads the ciphertext from CCS and checks whether . If not, it outputs ⊥ and aborts. Otherwise, computes and . Then, it verifies holds or not. If it is, returns the message . Otherwise, outputs ⊥ and aborts.
Security analysis
In this part, it proves that this protocol is selectively CPA-secure and verifiable in the standard model.
Theorem 1
Provided that the protocol in Waters17 is selectively CPA-secure, our proposal is selectively CPA-secure as well.
Proof
This protocol is selectively CPA-secure under the following two games.
: It is the original selectively CPA-secure game in CP-ABE protocol.
: Challenger picks at random, and keeps the rest of challenge ciphertext to generate as in .
The proof of this theorem consists of the following two lemmas. Lemma 1 proves the indistinguishability between and , while Lemma 2 demonstrates that the advantage of adversary in is negligible. Consequently, it concludes that the advantage in is also negligible.
Lemma 1
Assume that the scheme in Waters17 is selectively CPA-secure, and are computationally indistinguishable.
Proof
Suppose that an adversary distinguishes and with non-negligible probability, and an simulator attacks the scheme17 under the selective CPA security model with non-negligible advantage.
is a challenger in the selective CPA security model in Waters.17 A simulator interacts with by executing the following algorithms.
Init: The adversary delivers to as a challenge access structure. Then, the simulator gives this policy to . The challenger feeds back the public parameters in additional group of Waters.17
Setup: chooses at random and gets . Moreover, it chooses and as two collision-resistant hash functions. transmits to .
Query Phase 1: The adversary makes a private key query on attribute set . Simulator queries Private-Key-Extraction with on , and then accesses the private key . At last, returns the private keys to adversary.
Challenge: submits two challenge plaintexts and with equal size to the simulator. It picks a value and two message randomly. Then, it sends to the challenger. selects random , encrypts the message under and according to the encryption in Waters.17 After that, the ciphertext is sent to . The simulator chooses randomly and computes and . At last, transmits the challenge ciphertext to .
Query Phase 2: queries on Private-Key-Extraction adaptively as in Query Phase 1, and responds it as before.
Guess: returns its guess for , and it outputs as its guess for .
Provided that , has simulated appropriately. Otherwise, has appropriately simulated with non-negligible advantage, we design an algorithm as a simulator who attacks the selectively CPA-secure protocol with non-negligible advantage.
Lemma 2
Provided that the scheme in Waters17 is selectively CPA-secure, the adversary’s advantage in is negligible.
Proof
Suppose that the advantage of in is non-negligible. Besides, there is an algorithm as a simulator who attacks the protocol 17 in the selectively CPA-secure model with a non-negligible advantage.
Assume that is a challenger in selective CPA-security model, interacts with by running the algorithms as below.
Init: transmits a challenge access structure to . Simulator also gives to . The challenger delivers the public parameters in the additional group of Waters17 back to simulator.
Setup: Simulator picks random , computes , and there are two hash functions and with collision-resistant. After that, transmits to adversary.
Query Phase 1: adaptively issues the private key query on . Simulator receives a private key by querying Private-Key-Extraction with on . Then, the simulator returns the private key to adversary.
Challenge: The adversary submits two equal size messages and . Simulator sends to . After that, picks at random, encrypts under and as the encryption in Waters.17 Then, it gives the result ciphertext back to . The simulator chooses , and randomly, and calculates . At last, transmits to as a challenge ciphertext.
Query Phase 2: Adversary queries on Private-Key-Extraction adaptively as in Query Phase 1. Simulator responses this query correspondingly.
Guess: Finally, adversary returns a guess to simulator, it also takes as its guess for .
Obviously, has simulated appropriately. Provided that the advantage of adversary in is non-negligible, attacks selectively CPA-secure protocol17 with non-negligible advantage.
In conclusion, these two lemmas show that the first four algorithms in our protocol as basic CP-ABE protocol is selectively CPA-secure. After that, in the following theorem, we will prove that if basic CP-ABE protocol is selectively CPA-secure, the whole protocol is selectively CPA-secure as well.
Theorem 2
Provided that basic CP-ABE protocol is selectively CPA-secure, this protocol with outsourced decryption is selectively CPA-secure as well.
Proof
Suppose that, in the selectively CPA-secure model, the advantage of is non-negligible. acts as a simulator to attack the basic CP-ABE scheme with non-negligible advantage.
is a challenger in the selectively CPA-secure model of basic CP-ABE protocol. Simulator interacts with according to the algorithms as below.
Init: The adversary gives to as a challenge access structure. Then, simulator transmits this structure to . Challenger outputs the public parameters of basic CP-ABE scheme to .
Setup: Simulator gives the above parameters to .
Query Phase 1: maintains an empty list as well as a set E. launches the following queries adaptively.
Private-Key-Extraction: Based on the attribute set , queries the key generation oracle to receive the private key . After that, sets E=E and responses a private key to .
Transformation-Key-Extraction: Based on the attribute set , searches from the list . And outputting the transformation key to the adversary if it exists. Otherwise, picks , computes , and stores this tuple into and transmits it to .
Note that, the simulator is unable to access the actual retrieving key . It computes the following:
Challenge: Adversary submits two equal size messages and as a challenge access policy. transmits the tuple to challenger to compute on as a challenge ciphertext, where . After that, returns to .
Query Phase 2: makes a private key query adaptively as in Query Phase 1. returns the answer correspondingly.
Guess: returns a value as its guess on , and responses as well.
Provided that the guess of in this protocol is correct, the guess in basic CP-ABE scheme is also correct. Therefore, it concludes that if enables to attack the proposal with non-negligible advantage, in the selectively CPA-secure model, there is a simulator that attacks basic CP-ABE protocol with non-negligible advantage.
Theorem 3
Provided that CBDH assumption defined in Definition 1 holds, this CP-ABE protocol with outsourced decryption is verifiable.
Proof
Assume that attacks verifiability of this scheme with non-negligible advantage. In addition, acts as a simulator that enables to solve CBDH problem with non-negligible advantage.
Setup: Simulator randomly picks , let and be collision-resistant hash functions. After that, simulator defines the public parameters , and master secret key . It returns to adversary.
Query Phase 1: makes some queries on , , and algorithms. As simulator possesses master secret key , it is able to response these queries properly.
Challenge: submits a message and a challenge access policy to . The simulator calculates the ciphertext of and returns to , where and is selected by the simulator at random. Note that, is forbidden to access the random parameter .
Query Phase 2: Adversary launches the same query on private key as in Query Phase 1, and simulator responses as before.
Output: returns an attribute set and the transformed ciphertext . Simulator computes and , where is a retrieving key for the attribute set controlled by simulator .
Furthermore, if wins the above game, has ability of computing
where and are controlled by the simulator . Thus, solves the CDBH problem, which is paradoxical. Therefore, this CP-ABE protocol with outsourced decryption is verifiable.
Performance evaluation
In this section, it demonstrates the cost evaluation between this protocol and other related schemes19,28–31,40 from the aspects of communication and computation overhead.
Communication overhead
Let and be the element length in the additional cyclic group and the multiplicative cyclic group , respectively. denotes the number of attribute, and denotes the length of message. For scheme in Qin et al.,28 is denoted to the length of a symmetric encryption ciphertext, and is the length of a verification key. Moreover, for protocol in Mao et al.,29 is represented to the length of commit on a message. As shown in Table 2, it compares the communication cost in the phase of KeyGen, Encrypt, GenTKout, and Transformout. In the algorithm of KeyGen, the communication overhead between TA and DU is . In the algorithm of Encrypt, the communication overhead between DO and CSS in our scheme is . In the phase of transformation key generation, the overhead in communication is also . Meanwhile, in the algorithm of Transformout, the communication overhead between FN and DU is . To sum up, from this table, we can conclude that the size of the transmitted data with constant length in every phase is the smallest, which indicates a significant advantage of our protocol in communication.
We implement our scheme with previous works30,31,40 depending on pairing-based cryptography (PBC) library,44 the operations are executed on the 64-bit Windows 10 operation system, 2.20-GHz Intel Core i5-5200u CPU with 8-GB RAM. Concretely, we select the Type A elliptic curve parameter with the 160-bit order. Figures 3–7 demonstrate the experimental results in the average time of 100 operations. Specifically, in Figure 3, because of integrating the attribute into , it is obvious that the overhead of key generation in this protocol is constant and more efficient than others. We compare the time of encryption spent among these four schemes in Figure 4, which shows that our cost is much less than others for the reason that the overhead in this protocol is not increased with the quantity of attribute embedded in the access policy. Figures 5 and 7 show that the cost of decryption and outsourced decryption, respectively. However, the overhead of our proposal is a little more than Li et al.’s protocol30 for the reason that it needs one more bilinear pairing operations in our verification algorithm. Finally, in Figure 6, it demonstrates that the operation cost of this proposal is equal to the scheme in Li et al.30 in the phase of transformation. Conclusions as a result, this protocol shows a better performance in the phases of KeyGen, Encrypt, Decrypt, Transformout, and Decryptout, respectively.
The cost of KeyGen algorithm.
The cost of Encrypt algorithm.
The cost of Decrypt algorithm.
The cost of Transformout algorithm.
The cost of Decryptout algorithm.
Conclusion
In this article, it presents a lightweight verifiable outsourced CP-ABE protocol for the typical WBAN in IoT, which enables a user to verify the correctness of the transformed ciphertext. The security is proven to be selectively CPA-secure, and the verifiability is reduced to CBDH assumption in the standard model. In addition, the complicated decryption operation is outsourced to the FN instead of being laid on the device of DU. As for the communication and computation overhead, they do not depend on the amount of attributes, which reduces the cost of the whole system greatly. Therefore, this scheme has some applications in the limited power devices, such as IoTs. Moreover, our scheme takes advantage of fog computing to provide low latency and real-time interactions, while the blockchain protects the public parameter and ciphertext from being tampered by the inside and outside adversary.
Footnotes
Handling Editor: Zheng Chang
Declaration of conflicting interests
The author(s) declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.
Funding
The author(s) disclosed receipt of the following financial support for the research, authorship, and/or publication of this article: This work was supported by the National Key R&D Program of China under Grant 2017YFB0802000; the Natural Science Foundation of China under Grants 61802303, 61772418, and 61602378; the Key Research and Development Program of Shaanxi under Grant 2019KW-053; the Innovation Ability Support Program in Shaanxi Province of China under Grant 2017KJXX-47; the Natural Science Basic Research Plan in Shaanxi Province of China under Grants 2019JQ-866, 2018JZ6001, and 2016JM6033; the Research Program of Education Bureau of Shaanxi Province under Grant 19JK0803; the New Star Team of Xi’an University of Posts and Telecommunications under Grant 2016-02; the Fundamental Research Funds for the Central Universities under Grant GK201903005; and Guangxi Cooperative Innovation Center of Cloud Computing and Big Data under Grant YD1903.
LiXPengJYNiuJW, et al. A robust and energy efficient authentication protocol for industrial internet of things. IEEE Internet Things J2018; 5(3): 1606–1615.
3.
SunSFLyuCGuDW, et al. Towards efficient, secure, and fine-grained access control system in MSNs with flexible revocations. Int J Distrib Sens Netw2015; 11: 857405.
4.
LatréBBrarmBMoermanI, et al. A survey on wireless body area networks. Wirel Netw2011; 17(1): 1–18.
5.
LiXIbrahimMHKumariS, et al. Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw2017; 129(2): 429–443.
6.
HuCQLiHJHuoY, et al. Secure and efficient data communication protocol for wireless body area networks. IEEE Trans Multi-Scale Comput Syst2016; 2(2): 94–107.
ZhangYHDengRZhengD, et al. Efficient and robust certificateless signature for data crowdsensing in cloud-assisted industrial IoT. IEEE Trans Ind Inform2019; 15: 5099–5108.
9.
ZhangYHDengRLiuXM, et al. Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Trans Serv Comput. Epub ahead of print 7August2018. DOI: 10.1109/TSC.2018.2864191
10.
SahaiAWatersB.Fuzzy identity-based encryption. In: Proceedings of the 24th annual international conference on theory and applications of cryptographic techniques (EUROCRYPT’05), Aarhus, 22–26 May 2005, pp.457–473. Berlin: Springer.
11.
GoyalVPandeyOSahaiA, et al. Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM conference on computer and communications security (CCS’06), Alexandria, VA, 30 October–3 November 2006, pp.89–98. New York: ACM.
12.
OstrovskyRSahaiAWatersB.Attribute-based encryption with non-monotonic access structures. In: Proceedings of the 14th ACM conference on computer and communications security (CCS’07), Alexandria, VA, 28–31 October 2007, pp.195–203. New York: ACM.
13.
LewkoAWatersB.Unbounded HIBE and attribute-based encryption. In: Proceedings of the 30th annual international conference on theory and applications of cryptographic techniques (EUROCRYPT’11), Tallinn, 15–19 May 2011, pp.547–567. Berlin: Springer.
14.
LewkoAOkamotoTSahaiA, et al. Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption. In: Proceedings of the 29th annual international conference on theory and applications of cryptographic techniques (EUROCRYPT’10), French Riviera, 30 May–3 June 2010, pp.62–91. Berlin: Springer.
15.
OkamotoTTakashimaK. Fully secure functional encryption with general relations from the decisional linear assumption. In: Proceedings of the 30th annual conference on advances in cryptology (CRYPTO’10), Santa Barbara, CA, 15–19 August 2010, pp.191–208. Berlin: Springer.
16.
BethencourtJSahaiAWatersB. Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE symposium on security and privacy (SP’07), Berkeley, CA, 20–23 May 2007, pp.321–334. New York: IEEE.
17.
WatersB.Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization. In: Proceedings of the 14th international conference on practice and theory in public key cryptography conference on public key cryptography (PKC’11), Taormina, 6–9 March 2011, pp.53–70. Berlin: Springer.
18.
GreenMHohenbergerSWatersB. Outsourcing the decryption of ABE ciphertexts. In: Proceedings of the 20th USENIX conference on security (SEC’11), San Francisco, CA, 8–12 August 2011, pp.34–34. New York: ACM.
19.
LaiJZDengRHGuanCW, et al. Attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Foren Sec2013; 8(8): 1343–1354.
20.
ZhangYHDengRHLiuXM, et al. Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inform Sciences2018; 462: 262–277.
21.
ZhangYWenJT. The IoT electric business model: using blockchain technology for the Internet of Things. Peer Peer Netw Appl2017; 10(4): 983–994.
PuliafitoCMingozziEAnastasiG. Fog computing for the internet of mobile things: issues and challenges. In: Proceedings of the 2017 IEEE international conference on smart computing (SMARTCOMP’17), Hong Kong, 29–31 May 2017, pp.1–6. New York: IEEE.
24.
BonomiFMilitoRZhuJ, et al. Fog computing and its role in the Internet of Things. In: Proceedings of the first edition of the MCC workshop on mobile cloud computing (MCC’12), Helsinki, 17 August 2012, pp 13–16. New York: ACM.
25.
RocaDMilitoRNemirovskyM, et al. Tackling IoT ultra large scale systems: fog computing in support of hierarchical emergent behaviors. In: RahmaniALiljebergPPredenJS, et al. (eds) Fog computing in the Internet of Things. Cham: Springer, 2018, pp.33–48.
26.
HuPFDhelimSNingHS, et al. Survey on fog computing: architecture, key technologies, applications and open issues. J Netw Comput Appl2017; 98: 27–42.
27.
LinSQZhangRMaH, et al. Revisiting attribute-based encryption with verifiable outsourced decryption. IEEE Trans Inf Foren Sec2015; 10(10): 2119–2130.
28.
QinBDDengRHLiuSL, et al. Attribute-based encryption with efficient verifiable outsourced decryption. IEEE Trans Inf Foren Sec2015; 10(7): 1384–1393.
29.
MaoXPLaiJZMeiQX, et al. Generic and efficient constructions of attribute-based encryption with verifiable outsourced decryption. IEEE Trans Depend Secure2016; 13(5): 533–546.
30.
LiJGShaFJZhangYC, et al. Verifiable outsourced decryption of attribute-based encryption with constant ciphertext length. Secur Commun Netw2017; 2017(2): 1–11.
31.
LiJGWangYZhangYC, et al. Full verifiability for outsourced decryption in attribute based encryption. IEEE Trans Serv Comput. Epub ahead of print 31May2017. DOI: 10.1109/TSC.2017.2710190
32.
LiZDLiWMJinZP, et al. An efficient ABE scheme with verifiable outsourced encryption and decryption. IEEE Access2019; 7: 29023–29037.
33.
GuoRShiHXZhaoQL, et al. Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems. IEEE Access2018; 6: 11676–11686.
34.
GuoRShiHXZhengD, et al. Flexible and efficient blockchain-based ABE scheme with multi-authority for medical on demand in telemedicine system. IEEE Access2019; 7: 88012–88025.
35.
LiuJWLiXLYeL, et al. BPDS: a blockchain based privacy-preserving data sharing for electronic medical records. In: Proceedings of the 2018 IEEE global communications conference (Globecom’18), Abu Dhabi, United Arab Emirates, 9–13 December 2018. New York: IEEE.
36.
OliveiraMTReisLHACarranoRC, et al. Towards a blockchain-based secure electronic medical record for healthcare applications. In: Proceedings of the ICC 2019-2019 IEEE international conference on communications (ICC’19), Shanghai, China, 20–24 May 2019. New York: IEEE.
37.
RahmanMDAHossainMSLoukasG, et al. Blockchain-based mobile edge computing framework for secure therapy applications. IEEE Access2018; 6: 72469–72478.
38.
FerragMADerdourMMukherjeeM, et al. Blockchain technologies for the Internet of Things: research issues and challenges. IEEE Internet Things2019; 6(2): 2188–2204.
39.
ZhuLHWuYLGaiKK, et al. Controllable and trustworthy blockchain-based cloud data management. Future Gener Comput Syst2019; 91: 527–535.
40.
ZuoCShaoJWeiGY, et al. CCA-secure ABE with outsourced decryption for fog computing. Future Gener Comput Syst2018; 78: 730–738.
41.
MiaoYBMaJFLiuXM, et al. Lightweight fine-grained search over encrypted data in fog computing. IEEE Trans Serv Comput2019; 12: 772–785.
42.
FanKXuHYGaoLX, et al. Efficient and privacy preserving access control scheme for fog-enabled IoT. Future Gener Comput Syst2019; 99: 134–142.
43.
WangQHWangHQWangYF, et al. A distributed access control with outsourced computation in fog computing. Secur Commun Netw2019; 2019: 6782753.