Identity-Based Encryption Transformation for Flexible Sharing of Encrypted Data in Public Cloud

被引:56
|
作者
Deng, Hua [1 ]
Qin, Zheng [1 ]
Wu, Qianhong [2 ]
Guan, Zhenyu [2 ]
Deng, Robert H. [3 ]
Wang, Yujue
Zhou, Yunya [4 ,5 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Peoples R China
[2] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100083, Peoples R China
[3] Singapore Management Univ, Sch Informat Syst, Singapore 188065, Singapore
[4] Guilin Univ Elect Technol, Sch Comp Sci & Informat Secur, Guangxi Key Lab Cryptog & Informat Secur, Guilin 541004, Peoples R China
[5] State Grid Hunan Maintenance Co, Changsha 410004, Peoples R China
基金
中国博士后科学基金; 新加坡国家研究基金会; 中国国家自然科学基金;
关键词
Encryption; Cloud computing; Servers; Transforms; Electronic mail; data sharing; data privacy; access control; cryptographic encryption; PROXY RE-ENCRYPTION; BROADCAST ENCRYPTION; SCHEME; SECURE;
D O I
10.1109/TIFS.2020.2985532
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the cloud, a data owner usually encrypts his data in such a way that certain designated data users can decrypt the data. This raises a serious problem when the encrypted data needs to be shared to more people beyond those initially designated by the data owner. To address this problem, we introduce and formalize an identity-based encryption transformation (IBET) model by seamlessly integrating two well-established encryption mechanisms, namely identity-based encryption (IBE) and identity-based broadcast encryption (IBBE). In IBET, data users are identified and authorized for data access based on their recognizable identities, which avoids complicated certificate management in usual secure distributed systems. More importantly, IBET provides a transformation mechanism that converts an IBE ciphertext into an IBBE ciphertext so that a new group of users not specified during the IBE encryption can access the underlying data. We design a concrete IBET scheme based on bilinear groups and prove its security against powerful attacks. Thorough theoretical and experimental analyses demonstrate the high efficiency and practicability of the proposed scheme.
引用
收藏
页码:3168 / 3180
页数:13
相关论文
共 50 条
  • [1] Hierarchical Identity-Based Authenticated Encryption with Keyword Search over encrypted cloud data
    Shiraly, Danial
    Eslami, Ziba
    Pakniat, Nasrollah
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [2] Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data
    Camenisch, Jan
    Kohlweiss, Markulf
    Rial, Alfredo
    Sheedy, Caroline
    [J]. PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 196 - +
  • [3] Identity-Based Broadcast Proxy Re-Encryption for Flexible Data Sharing in VANETs
    Zhang, Jing
    Su, Shuangshuang
    Zhong, Hong
    Cui, Jie
    He, Debiao
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4830 - 4842
  • [4] Key Exchange Using Biometric Identity Based Encryption For Sharing Encrypted Data In Cloud Environment
    Hassan, Waleed K.
    Al-Assam, Hisham
    [J]. MOBILE MULTIMEDIA/IMAGE PROCESSING, SECURITY, AND APPLICATIONS 2017, 2017, 10221
  • [5] An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing
    Liang, Kaitai
    Liu, Joseph K.
    Wong, Duncan S.
    Susilo, Willy
    [J]. COMPUTER SECURITY - ESORICS 2014, PT I, 2014, 8712 : 257 - 272
  • [6] Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption
    Wei, Jianghong
    Liu, Wenfen
    Hu, Xuexian
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2018, 6 (04) : 1136 - 1148
  • [7] Reliable Data Sharing Using Revocable-Storage Identity-Based Encryption in Cloud Storage
    Pathare, Kedar G.
    Chouragade, P. M.
    [J]. 2017 INTERNATIONAL CONFERENCE ON RECENT TRENDS IN ELECTRICAL, ELECTRONICS AND COMPUTING TECHNOLOGIES (ICRTEECT), 2017, : 173 - 176
  • [8] Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems
    Liu, Zi-Yuan
    Mambo, Masahiro
    Tso, Raylin
    Tseng, Yi-Fan
    [J]. COMPUTER STANDARDS & INTERFACES, 2024, 89
  • [9] Comments on "Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption"
    Lee, Kwangsu
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2020, 8 (04) : 1299 - 1300
  • [10] An identity-based proxy re-encryption for data deduplication in cloud
    Kan, Ge
    Jin, Chunhua
    Zhu, Huihui
    Xu, Yongliang
    Liu, Nian
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 121