Identity Based Proxy Re-encryption Scheme (IBPRE+) for Secure Cloud Data Sharing

被引:7
|
作者
Wang, Xu An [1 ,2 ]
Xhafa, Fatos [3 ]
Zheng, Zhiheng [1 ]
Nie, Jinting [1 ]
机构
[1] Engn Univ Chinese Armed Police Force, Xian, Shannxi, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
[3] Tech Univ Catalonia, Dept Comp Sci, Barcelona, Spain
关键词
D O I
10.1109/INCoS.2016.83
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In proxy re-encryption (PRE), a proxy with re-encryption keys can transfer a ciphertext computed under Alice's public key into a new one, which can be decrypted by Bob only with his secret key. Recently, Wang et al. introduced the concept of PRE plus (PRE+) scheme, which can be seen as the dual of PRE, and is almost the same as PRE scheme except that the re-encryption keys are generated by the encrypter. Compared to PRE, PRE+ scheme can easily achieve this important property: the message-level based fine-grained delegation. In this paper, we extend the concept of PRE+ to the identity based setting. We propose a concrete IBPRE+ scheme based on 3-linear map and roughly discuss its properties. We also demonstrate potential application of this new primitive to secure cloud data sharing.
引用
收藏
页码:44 / 48
页数:5
相关论文
共 50 条
  • [1] Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme
    Wang, Xu An
    Xhafa, Fatos
    Ma, Jianfeng
    Zheng, Zhiheng
    [J]. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 130 : 153 - 165
  • [2] Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
    Liu, Qin
    Wang, Guojun
    Wu, Jie
    [J]. INFORMATION SCIENCES, 2014, 258 : 355 - 370
  • [3] Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
    Raghav
    Andola, Nitish
    Verma, Katyayani
    Venkatesan, S.
    Verma, Shekhar
    [J]. JOURNAL OF SUPERCOMPUTING, 2023, 79 (13): : 14117 - 14145
  • [4] Proactive threshold-proxy re-encryption scheme for secure data sharing on cloud
    Nitish Raghav
    Katyayani Andola
    S. Verma
    Shekhar Venkatesan
    [J]. The Journal of Supercomputing, 2023, 79 : 14117 - 14145
  • [5] A Quantum secure sharing protocol for Cloud data based on proxy re-encryption
    Chang, Yan
    Zhang, Shi-Bin
    Yan, Li-Li
    Wan, Guo-gen
    [J]. SCIENTIFIC REPORTS, 2020, 10 (01)
  • [6] A Quantum secure sharing protocol for Cloud data based on proxy re-encryption
    Yan Chang
    Shi-Bin Zhang
    Li-Li Yan
    Guo-gen Wan
    [J]. Scientific Reports, 10
  • [7] Blockchain based Proxy Re-Encryption Scheme for Secure IoT Data Sharing
    Manzoor, Ahsan
    Liyanage, Madhsanka
    Braeken, An
    Kanhere, Salil S.
    Ylianttila, Mika
    [J]. 2019 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN AND CRYPTOCURRENCY (ICBC), 2019, : 99 - 103
  • [8] A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing
    Liang, Kaitai
    Au, Man Ho
    Liu, Joseph K.
    Susilo, Willy
    Wong, Duncan S.
    Yang, Guomin
    Tran Viet Xuan Phuong
    Xie, Qi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) : 1667 - 1680
  • [9] Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing
    王亮亮
    陈克非
    毛贤平
    王永涛
    [J]. Journal of Shanghai Jiaotong University(Science), 2014, 19 (04) : 398 - 405
  • [10] A Novel Revocable and Identity-Based Conditional Proxy Re-Encryption Scheme With Ciphertext Evolution for Secure Cloud Data Sharing
    Yao, Shimao
    Dayot, Ralph Voltaire J.
    Kim, Hyung-Jin
    Ra, In-Ho
    [J]. IEEE ACCESS, 2021, 9 : 42801 - 42816