A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing

被引:109
|
作者
Liang, Kaitai [1 ]
Au, Man Ho [2 ]
Liu, Joseph K. [3 ]
Susilo, Willy [4 ]
Wong, Duncan S. [1 ]
Yang, Guomin [4 ]
Yu, Yong [4 ]
Yang, Anjia [1 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[2] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Hong Kong, Peoples R China
[3] ASTAR, Inst Infocomm Res, Singapore, Singapore
[4] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
基金
澳大利亚研究理事会;
关键词
Ciphertext-policy attribute-based encryption; Ciphertext-policy attribute-based proxy re-encryption; Adaptive chosen-ciphertext security; FUNCTIONAL ENCRYPTION;
D O I
10.1016/j.future.2014.11.016
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data owner to delegate the access rights of the encrypted data stored on a cloud storage system to others without leaking the information of the data to the honest-but-curious cloud server. It provides effectiveness for data sharing as the data owner even using limited resource devices (e.g. mobile devices) can offload most of the computational operations to the cloud. Since its introduction many variants of PRE have been proposed. A Ciphertext-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE), which is regarded as a general notion for PRE, employs the PRE technology in the attribute-based encryption cryptographic setting such that the proxy is allowed to convert an encryption under an access policy to another encryption under a new access policy. CP-ABPRE is applicable to many network applications, such as network data sharing. The existing CP-ABPRE systems, however, leave how to achieve adaptive CCA security as an interesting open problem. This paper, for the first time, proposes a new CP-ABPRE to tackle the problem by integrating the dual system encryption technology with selective proof technique. Although the new scheme supporting any monotonic access structures is built in the composite order bilinear group, it is proven adaptively CCA secure in the standard model without jeopardizing the expressiveness of access policy. We further make an improvement for the scheme to achieve more efficiency in the re-encryption key generation and re-encryption phases. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:95 / 108
页数:14
相关论文
共 50 条
  • [1] SecCloudSharing: Secure data sharing in public cloud using ciphertext-policy attribute-based proxy re-encryption with revocation
    Tiwari, Deepnarayan
    Gangadharan, G. R.
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (05)
  • [2] Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption
    Feng, Xinyu
    Li, Cong
    Li, Dan
    Fang, Yuejian
    Shen, Qingni
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 192 - 204
  • [3] A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds
    Liang, Kaitai
    Fang, Liming
    Wong, Duncan S.
    Susilo, Willy
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08): : 2004 - 2027
  • [4] A Ring Learning with Errors-Based Ciphertext-Policy Attribute-Based Proxy Re-Encryption Scheme for Secure Big Data Sharing in Cloud Environment
    Li, Juyan
    Peng, Jialiang
    Qiao, Zhiqi
    [J]. BIG DATA, 2022,
  • [5] Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
    Zengpeng LI
    Vishal SHARMA
    Chunguang MA
    Chunpeng GE
    Willy SUSILO
    [J]. Science China(Information Sciences), 2021, 64 (06) : 242 - 243
  • [6] Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
    Zengpeng Li
    Vishal Sharma
    Chunguang Ma
    Chunpeng Ge
    Willy Susilo
    [J]. Science China Information Sciences, 2021, 64
  • [7] Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption
    Kawai, Yutaka
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 301 - 315
  • [8] Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
    Li, Zengpeng
    Sharma, Vishal
    Ma, Chunguang
    Ge, Chunpeng
    Susilo, Willy
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (06)
  • [9] Ciphertext Policy Attribute-Based Proxy Re-encryption
    Luo, Song
    Hu, Jianbin
    Chen, Zhong
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 401 - +
  • [10] Secure and Efficient Data Sharing with Attribute-based Proxy Re-encryption Scheme
    Sepehri, Masoomeh
    Trombetta, Alberto
    [J]. PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,