Efficient ID-Based Proxy Pre-Encryption Scheme for Data Sharing in Cloud

被引:0
|
作者
Zhang, Jian-Hong [1 ]
Zhen, Wei-Na [2 ]
Zhao, Xu-Bing [2 ]
机构
[1] North China Univ Technol, Coll Sci, Beijing, Peoples R China
[2] North China Univ Technol, Inst Imagine Proc & Pattern Recognit, Beijing, Peoples R China
关键词
Component; proxy pre-encryption; security analysis; ID-based cryptography; data sharing; RE-ENCRYPTION;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud computing, to ensure the outsourced data's security, the data needs to be encrypted. To achieve the outsourced data sharing, it is very difficulty to download and encrypt for the resource-constrained user. Proxy re-encryption is an alternative way to reduce computation cost and communication overhead for the user since identity-based proxy re-encryption (ID-PRE) schemes allow a proxy to translate an encryption under Alice's identity into one computed under Bob's identity without being able to learn the plaintext. The property makes identity-based proxy re-encryption play very important role in cloud storage. In this paper, we propose a novel identity-based proxy re-encryption scheme, and show that the scheme is proven to be secure in the random oracle. The security is related to the decisional bilinear Diffie-Hellman problem. And our scheme can realize the user's anonymity, that is to say, given re-encryption keys and ciphertext, an adversary cannot learn decryptor's identities.
引用
收藏
页码:378 / 383
页数:6
相关论文
共 50 条
  • [1] Efficient ID-Based Proxy Blind Signature Scheme
    ZHANG Qing1
    2. School of Computer
    [J]. Wuhan University Journal of Natural Sciences, 2007, (01) : 105 - 108
  • [2] An Efficient Data Protection Scheme Based on Hierarchical ID-Based Encryption for MQTT
    Fan, Chun-I
    Shie, Cheng-Han
    Tseng, Yi-Fan
    Huang, Hui-Chun
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2023, 19 (03)
  • [3] An Efficient ID-based Proxy Ring Signature Scheme
    Wu Lei
    Li Daxing
    [J]. 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 560 - +
  • [4] Efficient ID-based broadcast encryption scheme - Comments
    Chien, Hung-Yu
    [J]. IEEE TRANSACTIONS ON BROADCASTING, 2007, 53 (04) : 809 - 810
  • [5] A NEW EFFICIENT ID-BASED PROXY BLIND SIGNATURE SCHEME
    Ming Yang Wang Yumin (State Key Lab of Integrated Service Network
    [J]. Journal of Electronics(China), 2008, (02) : 226 - 231
  • [6] An efficient ID-Based proxy signature scheme from pairings
    Gu, Chunxian
    Zhu, Yuefei
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2008, 4990 : 40 - 50
  • [7] A new efficient ID-based proxy blind signature scheme
    Lang, WM
    Tan, YM
    Yang, ZK
    Liu, G
    Peng, B
    [J]. ISCC2004: NINTH INTERNATIONAL SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, 2004, : 407 - 411
  • [8] Efficient revocable ID-based encryption with cloud revocation server
    Jia, Xiaoying
    Kumar, Neeraj
    Choo, Kim-Kwang Raymond
    He, Debiao
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (01)
  • [9] ID-based Encryption Scheme with Revocation
    Othman, Hafizul Azrie
    Ismail, Eddie Shahril
    [J]. 4TH INTERNATIONAL CONFERENCE ON MATHEMATICAL SCIENCES (ICMS4): MATHEMATICAL SCIENCES: CHAMPIONING THE WAY IN A PROBLEM BASED AND DATA DRIVEN SOCIETY, 2017, 1830
  • [10] A short ID-based proxy signature scheme
    Asaar, Maryam Rajabzadeh
    Salmasizadeh, Mahmoud
    Susilo, Willy
    [J]. INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2016, 29 (05) : 859 - 873