Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems

被引:1
|
作者
Liu, Zi-Yuan [1 ,3 ]
Mambo, Masahiro [2 ]
Tso, Raylin [3 ]
Tseng, Yi-Fan [3 ]
机构
[1] Kanazawa Univ, Grad Sch Nat Sci & Technol, Kanazawa 9201192, Japan
[2] Kanazawa Univ, Inst Sci & Engn, Kanazawa 9201192, Japan
[3] Natl Chengchi Univ, Dept Comp Sci, Taipei 11605, Taiwan
关键词
Adaptive security; Cloud computing; Data sharing; Hierarchical delegation; Identity-based encryption; ONE-TIME SIGNATURES; SECURITY; HIBE; IBE;
D O I
10.1016/j.csi.2023.103817
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud-based data sharing systems (DSS) have become prevalent due to their ample storage and convenient access control. To protect sensitive data privacy in DSS, anonymous identity-based encryption (IBE) is a promising approach, enabling encryption using a recipient's identity as a public key, while preventing identity and data leaks out of ciphertexts. As complete anonymity risks abuse and illegal usage, Blazy et al. introduced the notion called anonymous IBE with traceable identities (AIBET) at ARES'19, allowing users with tracing keys to identify recipients from ciphertexts. Unfortunately, existing AIBET schemes lack tracing key delegation and only consider security in weaker models (i.e., selective-identity attacks and chosen-plaintext attacks), posing risks of inconvenience and user privacy leaks. In this paper, we introduce a novel notion called anonymous hierarchical identity-based encryption with delegated traceability (AHIBEDT) for DSS. We formalize its syntax and define security notions in stronger models (i.e., adaptive-identity attacks and chosen-ciphertext attacks). In addition, we demonstrate that a concrete AHIBEDT scheme can be simply obtained from a hierarchical IBE scheme and a one-time signature scheme. The comparison results indicate that, despite a substantial increase in communication and computational costs, our approach achieves better security and functionality.
引用
收藏
页数:14
相关论文
共 50 条
  • [1] Identity-based proxy matchmaking encryption for cloud-based anonymous messaging systems
    Yan, Zhen
    Qu, Haipeng
    Zhang, Xiaoshuai
    Xu, Jian-Liang
    Lin, Xi-Jun
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 142
  • [2] Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
    Seo, Jae Hong
    Kobayashi, Tetsutaro
    Ohkubo, Miyako
    Suzuki, Koutarou
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 45 - 56
  • [3] Anonymous Hierarchical Identity-based Encryption EHR Sharing Mechanism Based on SM9
    Ying, Zuobin
    Liu, Minghao
    Kong, Siofong
    Xu, Shengmin
    Xiong, Jinbo
    [J]. 2022 IEEE 21ST INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING AND COMMUNICATIONS, IUCC/CIT/DSCI/SMARTCNS, 2022, : 17 - 22
  • [4] Anonymous hierarchical identity-based encryption (Without random oracles)
    Boyen, Xavier
    Waters, Brent
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 290 - 307
  • [5] Anonymous (Hierarchical) Identity-Based Encryption from Broader Assumptions
    Wu, Huangting
    Chow, Sherman S. M.
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT II, ACNS 2023, 2023, 13906 : 366 - 395
  • [6] Anonymous Hierarchical Identity-Based Encryption with Constant Size Ciphertexts
    Seo, Jae Hong
    Kobayashi, Tetsutaro
    Ohkubo, Miyako
    Suzuki, Koutarou
    [J]. PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 215 - +
  • [7] An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing
    Liang, Kaitai
    Liu, Joseph K.
    Wong, Duncan S.
    Susilo, Willy
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 257 - 272
  • [8] Anonymous Identity-Based Encryption with Identity Recovery
    Ma, Xuecheng
    Wang, Xin
    Lin, Dongdai
    [J]. INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 360 - 375
  • [9] Anonymous Multireceiver Identity-Based Encryption
    Fan, Chun-I
    Huang, Ling-Ying
    Ho, Pei-Hsiu
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2010, 59 (09) : 1239 - 1249
  • [10] Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud
    Deng, Hua
    Qin, Zheng
    Wu, Qianhong
    Guan, Zhenyu
    Deng, Robert H.
    Wang, Yujue
    Zhou, Yunya
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2020, 15 : 3168 - 3180