Non-transferable Unidirectional Proxy Re-encryption Scheme for Secure Social Cloud Storage Sharing

被引:4
|
作者
Wang, Xu An [1 ,2 ]
Xhafa, Fatos [3 ]
Hao, Wei [1 ]
He, Wei [4 ]
机构
[1] Engn Univ Chinese Armed Police Force, Beijing, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
[3] Tech Univ Catalonia, Dept Comp Sci, Barcelona, Spain
[4] E Knowledge Stn Chinese Armed Police Force, Beijing, Peoples R China
关键词
D O I
10.1109/INCoS.2016.82
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy re-encryption (PRE), introduced by Blaze et al. in 1998, allows a semi-trusted proxy with the re-encryption key to translate a ciphertext under the delegator into another ciphertext, which can be decrypted by the delegatee. In this process, the proxy is required to know nothing about the plaintext. Many PRE schemes have been proposed so far, however until now almost all the unidirectional PRE schemes suffer from the transferable property. That is, if the proxy and a set of delegatees collude, they can re-delegate the delegator's decryption rights to the other ones, while the delegator has no agreement on this. Thus designing nontransferable unidirectional PRE scheme is an important open research problem in the field. In this paper, we tackle this open problem by using the composite order bilinear pairing. Concretely, we design a non-transferable unidirectional PRE scheme based on Hohenberger et al.'s unidirectional PRE scheme. Furthermore, we discuss our scheme's application to secure cloud storage, especially for sharing private multimedia content for social cloud storage users.
引用
收藏
页码:328 / 331
页数:4
相关论文
共 50 条
  • [21] A Secure Re-Encryption Scheme for Data Sharing in Unreliable Cloud Environment
    Sultan, Nazatul Haque
    Barbhuiya, Ferdous Ahmed
    [J]. PROCEEDINGS 2016 IEEE WORLD CONGRESS ON SERVICES - SERVICES 2016, 2016, : 75 - 80
  • [22] KAPRE: Key-aggregate proxy re-encryption for secure and flexible data sharing in cloud storage
    Pareek, Gaurav
    Purushothama, B. R.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 63
  • [23] Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing
    Manzoor, Ahsan
    Liyanage, Madhsanka
    Braeken, An
    Kanhere, Salil S.
    Ylianttila, Mika
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2019, : 99 - 103
  • [24] Accountable Proxy Re-Encryption for Secure Data Sharing
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    Lan, Xiao
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 145 - 159
  • [25] Unidirectional chosen-ciphertext secure proxy re-encryption
    Libert, Benoit
    Vergnaud, Damien
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 360 - +
  • [26] Fine-grained and heterogeneous proxy re-encryption for secure cloud storage
    Xu, Peng
    Chen, Hongwu
    Zou, Deqing
    Jin, Hai
    [J]. CHINESE SCIENCE BULLETIN, 2014, 59 (32): : 4201 - 4209
  • [27] Semantic keyword searchable proxy re-encryption for postquantum secure cloud storage
    Yang, Yang
    Zheng, Xianghan
    Chang, Victor
    Tang, Chunming
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (19):
  • [28] Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
    Libert, Benoit
    Vergnaud, Damien
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (03) : 1786 - 1802
  • [29] Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage
    Jiang, Linmei
    Guo, Donghui
    [J]. IEEE ACCESS, 2017, 5 : 13336 - 13345
  • [30] Outsourcing Online/offline Proxy Re-encryption for Mobile Cloud Storage Sharing
    Wang, Xu An
    Nedjah, Nadia
    Sangaiah, Arun Kumar
    Shan, Chun
    Wang, Zuliang
    [J]. ADVANCES ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING, 3PGCIC-2018, 2019, 24 : 478 - 485