Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds

被引:5
|
作者
Luo, Fucai [1 ]
Wang, Haiyan [2 ]
Susilo, Willy [3 ]
Yan, Xingfu [4 ]
Zheng, Xiaofan [4 ]
机构
[1] Zhejiang Gongshang Univ, Sch Comp Sci & Technol, Hangzhou 310018, Peoples R China
[2] Peng Cheng Lab, Dept New Networks, Shenzhen 518000, Peoples R China
[3] Univ Wollongong, Inst Cybersecur & Cryptol, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[4] South China Normal Univ, Sch Comp Sci, Guangzhou 510631, Peoples R China
基金
中国国家自然科学基金;
关键词
Decoding; Public key; Encryption; Closed box; Transforms; Performance evaluation; Computer security; Cloud computing; data sharing; proxy re-encryption; tracing; trace-and-revoke PRE;
D O I
10.1109/TIFS.2024.3357240
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Proxy re-encryption (PRE), as a promising cryptographic primitive for secure data sharing in clouds, has been widely studied for decades. PRE allows the proxies to use the re-encryption keys to convert ciphertexts computed under the delegator's public key into ones that can be decrypted using the delegatees' secret keys, without knowing anything about the underlying plaintext. This delegable property of decryption rights enables flexible cloud data sharing, but it raises an important issue: if some proxies reveal their re-encryption keys, or collude with some delegatees to create a pirate decoder, then anyone who gains access to the pirate decoder can decrypt all ciphertexts computed under the delegator's public key without the delegator's permission. This paper opens up a potentially new avenue of research to address the above (re-encryption) key abuse problem by proposing the first public trace-and-revoke PRE system, where the malicious delegatees and proxies involved in the generation of a pirate decoder can be identified by anyone who gains access to the pirate decoder, and their decryption capabilities can subsequently be revoked by the content distributor. Our construction is multi-hop, supports user revocation and public (black-box) traceability, and achieves significant efficiency advantages over previous constructions. Technically, our construction is a generic transformation from inner-product functional PRE (IPFPRE) that we introduce to trace-and-revoke PRE. In addition, we instantiate our generic construction of trace-and-revoke PRE from the Learning with Errors (LWE) assumption, which was widely believed to be quantum-resistant. This is achieved by proposing the first LWE-based IPFPRE scheme, which may be of independent interest. Finally, we conduct a comprehensive performance evaluation of our LWE-based trace-and-revoke PRE scheme, and the experimental results show that the proposed LWE-based trace-and-revoke PRE scheme is practical and outperforms current state-of-the-art traceable PRE schemes.
引用
收藏
页码:2919 / 2934
页数:16
相关论文
共 50 条
  • [21] Conditional Proxy Re-Encryption for Secure Big Data Group Sharing in Cloud Environment
    Son, Junggab
    Kim, Donghyun
    Hussain, Rasheed
    Oh, Heekuck
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 541 - 546
  • [22] Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
    Nitish Raghav
    Katyayani Andola
    S. Verma
    Shekhar Venkatesan
    The Journal of Supercomputing, 2023, 79 : 14117 - 14145
  • [23] Secure and Efficient Data Sharing with Attribute-based Proxy Re-encryption Scheme
    Sepehri, Masoomeh
    Trombetta, Alberto
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [24] Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
    Raghav
    Andola, Nitish
    Verma, Katyayani
    Venkatesan, S.
    Verma, Shekhar
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (13): : 14117 - 14145
  • [25] A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
    Agyekum, Kwame Opuni-Boachie Obour
    Xia, Qi
    Sifah, Emmanuel Boateng
    Cobblah, Christian Nii Aflah
    Xia, Hu
    Gao, Jianbin
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1685 - 1696
  • [26] Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing
    Eltayieb, Nabeil
    Elhabob, Rashad
    Abdelgader, Abdeldime M. S.
    Liao, Yongjian
    Li, Fagen
    Zhou, Shijie
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 162
  • [27] PRE+: dual of proxy re-encryption for secure cloud data sharing service
    Wang, Xu An
    Xhafa, Fatos
    Ma, Jianfeng
    Barolli, Leonard
    Ge, Yunlong
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 44 - 69
  • [28] A Threshold Proxy Re-Encryption Scheme for Secure IoT Data Sharing Based on Blockchain
    Chen, Yingwen
    Hu, Bowen
    Yu, Hujie
    Duan, Zhimin
    Huang, Junxin
    ELECTRONICS, 2021, 10 (19)
  • [29] Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing
    王亮亮
    陈克非
    毛贤平
    王永涛
    JournalofShanghaiJiaotongUniversity(Science), 2014, 19 (04) : 398 - 405
  • [30] Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing
    Wang L.-L.
    Chen K.-F.
    Mao X.-P.
    Wang Y.-T.
    Journal of Shanghai Jiaotong University (Science), 1600, Shanghai Jiaotong University (19): : 398 - 405