Non-transferable Unidirectional Proxy Re-encryption Scheme for Secure Social Cloud Storage Sharing

被引:4
|
作者
Wang, Xu An [1 ,2 ]
Xhafa, Fatos [3 ]
Hao, Wei [1 ]
He, Wei [4 ]
机构
[1] Engn Univ Chinese Armed Police Force, Beijing, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
[3] Tech Univ Catalonia, Dept Comp Sci, Barcelona, Spain
[4] E Knowledge Stn Chinese Armed Police Force, Beijing, Peoples R China
关键词
D O I
10.1109/INCoS.2016.82
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy re-encryption (PRE), introduced by Blaze et al. in 1998, allows a semi-trusted proxy with the re-encryption key to translate a ciphertext under the delegator into another ciphertext, which can be decrypted by the delegatee. In this process, the proxy is required to know nothing about the plaintext. Many PRE schemes have been proposed so far, however until now almost all the unidirectional PRE schemes suffer from the transferable property. That is, if the proxy and a set of delegatees collude, they can re-delegate the delegator's decryption rights to the other ones, while the delegator has no agreement on this. Thus designing nontransferable unidirectional PRE scheme is an important open research problem in the field. In this paper, we tackle this open problem by using the composite order bilinear pairing. Concretely, we design a non-transferable unidirectional PRE scheme based on Hohenberger et al.'s unidirectional PRE scheme. Furthermore, we discuss our scheme's application to secure cloud storage, especially for sharing private multimedia content for social cloud storage users.
引用
收藏
页码:328 / 331
页数:4
相关论文
共 50 条
  • [1] Non-transferable Proxy Re-encryption
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    [J]. COMPUTER JOURNAL, 2019, 62 (04): : 490 - 506
  • [2] Non-transferable proxy re-encryption for multiple groups
    Cho, Ei Mon
    San, Lwin
    Koshiba, Takeshi
    [J]. INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2018, 8 (01) : 20 - 29
  • [3] Secure Non-transferable Proxy Re-encryption for Group Membership and Non-membership
    Cho, Ei Mon
    San, Lwin
    Koshiba, Takeshi
    [J]. ADVANCES IN NETWORK-BASED INFORMATION SYSTEMS, NBIS-2017, 2018, 7 : 876 - 887
  • [4] CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
    Mishra, Bharati
    Jena, Debsish
    [J]. PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [5] Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
    Raghav
    Andola, Nitish
    Verma, Katyayani
    Venkatesan, S.
    Verma, Shekhar
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (13): : 14117 - 14145
  • [6] Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
    Nitish Raghav
    Katyayani Andola
    S. Verma
    Shekhar Venkatesan
    [J]. The Journal of Supercomputing, 2023, 79 : 14117 - 14145
  • [7] Secure bidirectional proxy re-encryption for cryptographic cloud storage
    Shao, Jun
    Lu, Rongxing
    Lin, Xiaodong
    Liang, Kaitai
    [J]. PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 113 - 121
  • [8] Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing
    王亮亮
    陈克非
    毛贤平
    王永涛
    [J]. Journal of Shanghai Jiaotong University(Science), 2014, 19 (04) : 398 - 405
  • [9] A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage
    Luo, Wei
    Ma, Wenping
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 519 - 530
  • [10] Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing
    Wang L.-L.
    Chen K.-F.
    Mao X.-P.
    Wang Y.-T.
    [J]. Journal of Shanghai Jiaotong University (Science), 1600, Shanghai Jiaotong University (19): : 398 - 405