Server-aided access control for cloud computing

被引:1
|
作者
WENG Jian
WENG Jia-si
LIU Jia-nan
HOU Lin
机构
[1] CollegeofInformationScienceandTechnology,JinanUniversity
关键词
threshold conditional proxy re-encryption; server-aided access control; cloud computing; chosen-ciphertext attack;
D O I
暂无
中图分类号
TP309 [安全保密];
学科分类号
081201 ; 0839 ; 1402 ;
摘要
With the massive diffusion of cloud computing, more and more sensitive data is being centralized into the cloud for sharing, which brings forth new challenges for the security and privacy of outsourced data. To address these challenges, the server-aided access control(SAAC) system was proposed. The SAAC system builds upon a variant of conditional proxy re-encryption(CPRE) named threshold conditional proxy re-encryption(TCPRE). In TCPRE, t out of n proxies can re-encrypt ciphertexts(satisfying some specified conditions) for the delegator(while up to t-1 proxies cannot), and the correctness of the re-encrypted ciphertexts can be publicly verified. Both features guarantee the trust and reliability on the proxies deployed in the SAAC system. The security models for TCPRE were formalized, several TCPRE constructions were proposed and that our final scheme was secure against chosen-ciphertext attacks was proved.
引用
收藏
页码:58 / 76
页数:19
相关论文
共 6 条
  • [1] CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles[J]. DENG Robert. Science China(Information Sciences). 2010(03)
  • [2] Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
    Weng, Jian
    Deng, Robert H.
    Liu, Shengli
    Chen, Kefei
    [J]. INFORMATION SCIENCES, 2010, 180 (24) : 5077 - 5089
  • [3] Cumulus[J] . Michael Vrable,Stefan Savage,Geoffrey M. Voelker. ACM Transactions on Storage (TOS) . 2009 (4)
  • [4] Improved proxy re-encryption schemes with applications to secure distributed storage[J] . Giuseppe Ateniese,Kevin Fu,Matthew Green,Susan Hohenberger. ACM Transactions on Information and System Security (TISSEC) . 2006 (1)
  • [5] HOW TO SHARE A SECRET
    SHAMIR, A
    [J]. COMMUNICATIONS OF THE ACM, 1979, 22 (11) : 612 - 613
  • [6] Final report on main computational assumptions in cryptography .2 http://www.ecrypt.eu.org/documents/D.MAYA.6.pdf . 2013