Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds

被引:0
|
作者
Chen, Wei-Hao [1 ]
Fan, Chun-I [2 ]
Tseng, Yi-Fan [1 ]
机构
[1] Natl Sun Yat Sen Univ, Comp Sci & Engn, Kaohsiung, Taiwan
[2] Natl Sun Yat Sen Univ, Informat Secur Res Ctr, Kaohsiung, Taiwan
关键词
Cloud Computing; Proxy Re-Encryption; Key-Aggregate Cryptosystem; Access Control;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing undoubtedly is the most unparalleled technique in rapidly developing industries. Protecting sensitive files stored in the clouds from being accessed by malicious attackers is essential to the success of the clouds. In proxy reencryption schemes, users delegate their encrypted files to other users by using re-encryption keys, which elegantly transfers the users' burden to the cloud servers. Moreover, one can adopt conditional proxy re-encryption schemes to employ their access control policy on the files to be shared. However, we recognize that the size of re-encryption keys will grow linearly with the number of the condition values, which may be impractical in low computational devices. In this paper, we combine a key-aggregate approach and a proxy re-encryption scheme into a key-aggregate proxy re-encryption scheme. It is worth mentioning that the proposed scheme is the first key-aggregate proxy re-encryption scheme. As a side note, the size of re-encryption keys is constant.
引用
收藏
页码:70 / 73
页数:4
相关论文
共 50 条
  • [1] KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage
    Pareek, Gaurav
    Purushothama, B. R.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [2] Accountable Proxy Re-Encryption for Secure Data Sharing
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    Lan, Xiao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 145 - 159
  • [3] Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds
    Xu, Peng
    Xu, Jun
    Wang, Wei
    Jin, Hai
    Susilo, Willy
    Zou, Deqing
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 913 - 918
  • [4] Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds
    Luo, Fucai
    Wang, Haiyan
    Susilo, Willy
    Yan, Xingfu
    Zheng, Xiaofan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 2919 - 2934
  • [5] Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map
    Fan, Chun-, I
    Tseng, Yi-Fan
    Huang, Yen-Lin
    2020 15TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2020), 2020, : 9 - 15
  • [6] Secure and Efficient Data Sharing with Attribute-based Proxy Re-encryption Scheme
    Sepehri, Masoomeh
    Trombetta, Alberto
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [7] Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing
    王亮亮
    陈克非
    毛贤平
    王永涛
    JournalofShanghaiJiaotongUniversity(Science), 2014, 19 (04) : 398 - 405
  • [8] Efficient and Secure Certificateless Proxy Re-Encryption
    Liu, Ya
    Wang, Hongbing
    Wang, Chunlu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04): : 2254 - 2275
  • [9] Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing
    Wang L.-L.
    Chen K.-F.
    Mao X.-P.
    Wang Y.-T.
    Journal of Shanghai Jiaotong University (Science), 1600, Shanghai Jiaotong University (19): : 398 - 405
  • [10] Secure Data Sharing in the Cloud Through Proxy Re-Encryption Technique
    Adilakshmi, Jyothi
    Rithika, Badgoian
    Pushpalatha, Chitikela
    Venkatesh, Thurpati
    Lohitha, Mandapati
    2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 700 - 705