A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage

被引:33
|
作者
Zeng, Peng [1 ]
Choo, Kim-Kwang Raymond [2 ,3 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[3] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
来源
IEEE ACCESS | 2018年 / 6卷
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Secure cloud storage; conditional proxy re-encryption; sender-specified proxy re-encryption; IND-CPA; IND-CCA; MULTIUSE; SCHEME;
D O I
10.1109/ACCESS.2018.2879479
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure cloud storage has important applications in our big data-driven society, and to achieve secure cloud storage, we need to enforce strong access control mechanism. Proxy re-encryption (PRE) has been shown to be an effective tool of constructing cryptographically enforced access control schemes. In a traditional PRE scheme, a semi-trusted proxy can convert all ciphertexts for a delegator to cipher-texts for a delegatee once the proxy obtains the relevant re-encryption key from the delegator. In many practical applications, however, a fine-grained delegation of decryption abilities may be demanded, and thus, the notion of conditional PRE (C-PRE) is introduced, which allows only the ciphertexts satisfying a concrete condition to be converted by the proxy. In this paper, we introduce a special kind of C-PRE, sender-specified PRE (SS-PRE), which enables the delegator to delegate the decryption right of the ciphertexts from a specified sender to his/her delegatee. We give a formal definition of SS-PRE and its security model. We also provide the concrete constructions of an IND-CPA secure SS-PRE scheme and an IND-CCA secure SS-PRE scheme with the properties of unidirectionality and single-use and prove the security of both schemes in the standard model. The detailed analysis shows that our new IND-CCA secure SS-PRE scheme achieves a higher efficiency in computation cost and ciphertext size than the conventional C-PRE schemes.
引用
收藏
页码:70017 / 70024
页数:8
相关论文
共 50 条
  • [1] Secure bidirectional proxy re-encryption for cryptographic cloud storage
    Shao, Jun
    Lu, Rongxing
    Lin, Xiaodong
    Liang, Kaitai
    [J]. PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 113 - 121
  • [2] A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud
    Chen, Zhanwen
    Chen, Jiageng
    Meng, Weizhi
    [J]. 2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 569 - 576
  • [3] Fine-grained and heterogeneous proxy re-encryption for secure cloud storage
    Xu, Peng
    Chen, Hongwu
    Zou, Deqing
    Jin, Hai
    [J]. CHINESE SCIENCE BULLETIN, 2014, 59 (32): : 4201 - 4209
  • [4] A Searchable Hierarchical Conditional Proxy Re-Encryption Scheme for Cloud Storage Services
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Chin-Ling
    Chiu, Shih-Ting
    [J]. INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (03): : 289 - 299
  • [5] Semantic keyword searchable proxy re-encryption for postquantum secure cloud storage
    Yang, Yang
    Zheng, Xianghan
    Chang, Victor
    Tang, Chunming
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (19):
  • [6] Conditional Proxy Re-Encryption for Secure Big Data Group Sharing in Cloud Environment
    Son, Junggab
    Kim, Donghyun
    Hussain, Rasheed
    Oh, Heekuck
    [J]. 2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 541 - 546
  • [7] Fine-grained and heterogeneous proxy re-encryption for secure cloud storage
    Peng Xu
    Hongwu Chen
    Deqing Zou
    Hai Jin
    [J]. Chinese Science Bulletin, 2014, 59 (32) : 4201 - 4209
  • [8] A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system
    Liu, Yepeng
    Ren, Yongjun
    Ge, Chunpeng
    Xia, Jinyue
    Wang, Qirun
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 47 : 125 - 131
  • [9] CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
    Mishra, Bharati
    Jena, Debsish
    [J]. PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [10] A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment
    Son, Junggab
    Kim, Donghyun
    Bhuiyan, Md Zakirul Alam
    Hussain, Rasheed
    Oh, Heekuck
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (14):