Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds

被引:0
|
作者
Chen, Wei-Hao [1 ]
Fan, Chun-I [2 ]
Tseng, Yi-Fan [1 ]
机构
[1] Natl Sun Yat Sen Univ, Comp Sci & Engn, Kaohsiung, Taiwan
[2] Natl Sun Yat Sen Univ, Informat Secur Res Ctr, Kaohsiung, Taiwan
关键词
Cloud Computing; Proxy Re-Encryption; Key-Aggregate Cryptosystem; Access Control;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing undoubtedly is the most unparalleled technique in rapidly developing industries. Protecting sensitive files stored in the clouds from being accessed by malicious attackers is essential to the success of the clouds. In proxy reencryption schemes, users delegate their encrypted files to other users by using re-encryption keys, which elegantly transfers the users' burden to the cloud servers. Moreover, one can adopt conditional proxy re-encryption schemes to employ their access control policy on the files to be shared. However, we recognize that the size of re-encryption keys will grow linearly with the number of the condition values, which may be impractical in low computational devices. In this paper, we combine a key-aggregate approach and a proxy re-encryption scheme into a key-aggregate proxy re-encryption scheme. It is worth mentioning that the proposed scheme is the first key-aggregate proxy re-encryption scheme. As a side note, the size of re-encryption keys is constant.
引用
收藏
页码:70 / 73
页数:4
相关论文
共 50 条
  • [41] A certificate-based proxy re-encryption plus scheme for secure medical data sharing
    Liu, Shuanggen
    Qin, Haozhe
    Taniar, David
    Liu, Wandi
    Li, Yuanjun
    Zhang, Jindan
    INTERNET OF THINGS, 2023, 23
  • [42] Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain
    Manzoor, Ahsan
    Braeken, An
    Kanhere, Salil S.
    Ylianttila, Mika
    Liyanage, Madhsanka
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 176
  • [43] Verifiable attribute-based proxy re-encryption for secure public cloud data sharing
    Lin, Suqing
    Zhang, Rui
    Wang, Mingsheng
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1748 - 1758
  • [44] Identity Based Proxy Re-encryption Scheme (IBPRE+) for Secure Cloud Data Sharing
    Wang, Xu An
    Xhafa, Fatos
    Zheng, Zhiheng
    Nie, Jinting
    2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 44 - 48
  • [45] Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
    Liu, Qin
    Wang, Guojun
    Wu, Jie
    INFORMATION SCIENCES, 2014, 258 : 355 - 370
  • [46] Blockchain-based Scalable and Secure EHR Data Sharing using Proxy Re-Encryption
    Sammeta, Naresh
    Parthiban, Latha
    INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2023, 20 (05) : 702 - 710
  • [47] Efficient Fine-Grained Data Sharing Based on Proxy Re-Encryption in IIoT
    Zhang, Qingyang
    Fu, Yujie
    Cui, Jie
    He, Debiao
    Zhong, Hong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5797 - 5809
  • [48] Efficient Unidirectional Proxy Re-Encryption
    Chow, Sherman S. M.
    Weng, Jian
    Yang, Yanjiang
    Deng, Robert H.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 316 - +
  • [49] Efficient and Secure MPC Through Integration of FHE and Proxy Re-encryption
    Rohitkumar R. Upadhyay
    Sahadeo Padhye
    SN Computer Science, 6 (2)
  • [50] An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing
    Liang, Kaitai
    Liu, Joseph K.
    Wong, Duncan S.
    Susilo, Willy
    COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 257 - 272