Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds

被引:0
|
作者
Chen, Wei-Hao [1 ]
Fan, Chun-I [2 ]
Tseng, Yi-Fan [1 ]
机构
[1] Natl Sun Yat Sen Univ, Comp Sci & Engn, Kaohsiung, Taiwan
[2] Natl Sun Yat Sen Univ, Informat Secur Res Ctr, Kaohsiung, Taiwan
关键词
Cloud Computing; Proxy Re-Encryption; Key-Aggregate Cryptosystem; Access Control;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing undoubtedly is the most unparalleled technique in rapidly developing industries. Protecting sensitive files stored in the clouds from being accessed by malicious attackers is essential to the success of the clouds. In proxy reencryption schemes, users delegate their encrypted files to other users by using re-encryption keys, which elegantly transfers the users' burden to the cloud servers. Moreover, one can adopt conditional proxy re-encryption schemes to employ their access control policy on the files to be shared. However, we recognize that the size of re-encryption keys will grow linearly with the number of the condition values, which may be impractical in low computational devices. In this paper, we combine a key-aggregate approach and a proxy re-encryption scheme into a key-aggregate proxy re-encryption scheme. It is worth mentioning that the proposed scheme is the first key-aggregate proxy re-encryption scheme. As a side note, the size of re-encryption keys is constant.
引用
收藏
页码:70 / 73
页数:4
相关论文
共 50 条
  • [31] A Proxy Re-Encryption Approach to Secure Data Sharing in the Internet of Things Based on Blockchain
    Agyekum, Kwame Opuni-Boachie Obour
    Xia, Qi
    Sifah, Emmanuel Boateng
    Cobblah, Christian Nii Aflah
    Xia, Hu
    Gao, Jianbin
    IEEE SYSTEMS JOURNAL, 2022, 16 (01): : 1685 - 1696
  • [32] Certificateless Proxy Re-encryption with Cryptographic Reverse Firewalls for Secure Cloud Data Sharing
    Eltayieb, Nabeil
    Elhabob, Rashad
    Abdelgader, Abdeldime M. S.
    Liao, Yongjian
    Li, Fagen
    Zhou, Shijie
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2025, 162
  • [33] PRE+: dual of proxy re-encryption for secure cloud data sharing service
    Wang, Xu An
    Xhafa, Fatos
    Ma, Jianfeng
    Barolli, Leonard
    Ge, Yunlong
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2018, 14 (01) : 44 - 69
  • [34] A Threshold Proxy Re-Encryption Scheme for Secure IoT Data Sharing Based on Blockchain
    Chen, Yingwen
    Hu, Bowen
    Yu, Hujie
    Duan, Zhimin
    Huang, Junxin
    ELECTRONICS, 2021, 10 (19)
  • [35] Efficient Verifiable Key-Aggregate Keyword Searchable Encryption for Data Sharing in Outsourcing Storage
    Wang, Xuqi
    Cheng, Xiangguo
    Xie, Yu
    IEEE ACCESS, 2020, 8 (08): : 11732 - 11742
  • [36] Secure and Efficient IBE-PKE Proxy Re-Encryption
    Mizuno, Takeo
    Doi, Hiroshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 36 - 44
  • [37] A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
    Liang, Kaitai
    Au, Man Ho
    Liu, Joseph K.
    Susilo, Willy
    Wong, Duncan S.
    Yang, Guomin
    Yu, Yong
    Yang, Anjia
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 95 - 108
  • [38] Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
    Hu, Huidan
    Cao, Zhenfu
    Dong, Xiaolei
    IEEE ACCESS, 2022, 10 : 87322 - 87332
  • [39] Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Liu, Zhe
    Baek, Joonsang
    Luo, Xiapu
    Fang, Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 949 - 960
  • [40] A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Baek, Joonsang
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2907 - 2919