An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing

被引:0
|
作者
Liang, Kaitai [1 ]
Liu, Joseph K. [2 ]
Wong, Duncan S. [1 ]
Susilo, Willy [3 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Hong Kong, Hong Kong, Peoples R China
[2] Infocomm Secur, Dept Inst Infocomm Res, Singapore, Singapore
[3] Univ Wollongong, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
来源
基金
澳大利亚研究理事会;
关键词
Revocable identity-based encryption; cloud-based revocable identity-based proxy re-encryption; standard model; SECURE; CRYPTOSYSTEMS; DELEGATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification process. However, revocation remains as a daunting task in terms of ciphertext update and key update phases. In this paper, we provide an affirmative solution to solve the efficiency problem incurred by revocation. We propose the first cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation but also delegation of decryption rights. No matter a user is revoked or not, at the end of a given time period the cloud acting as a proxy will re-encrypt all ciphertexts of the user under the current time period to the next time period. If the user is revoked in the forthcoming time period, he cannot decrypt the ciphertexts by using the expired private key anymore. Comparing to some naive solutions which require a private key generator (PKG) to interact with non-revoked users in each time period, the new scheme provides definite advantages in terms of communication and computation efficiency.
引用
收藏
页码:257 / 272
页数:16
相关论文
共 50 条
  • [1] Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme
    Park, Seunghwan
    Lee, Dong Hoon
    [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (07): : 1933 - 1936
  • [2] An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme
    Wang, Changji
    Fang, Jian
    Li, Yuan
    [J]. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 14 - 26
  • [3] Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
    Ge, Chunpeng
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1214 - 1226
  • [4] A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage
    Luo, Wei
    Ma, Wenping
    [J]. CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 519 - 530
  • [5] A Novel Revocable and Identity-Based Conditional Proxy Re-Encryption Scheme With Ciphertext Evolution for Secure Cloud Data Sharing
    Yao, Shimao
    Dayot, Ralph Voltaire J.
    Kim, Hyung-Jin
    Ra, In-Ho
    [J]. IEEE ACCESS, 2021, 9 : 42801 - 42816
  • [6] Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
    Wang, Xiaolei
    Wang, Yang
    Wang, Mingqiang
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 535 - 544
  • [7] POSTER: A Certificateless Proxy Re-Encryption Scheme for Cloud-based Data Sharing
    Wu, Xiaoxin
    Xu, Lei
    Zhang, Xinwen
    [J]. PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 869 - 871
  • [8] Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds
    Lu, Yang
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (07): : 2703 - 2718
  • [9] Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
    Hu, Huidan
    Cao, Zhenfu
    Dong, Xiaolei
    [J]. IEEE ACCESS, 2022, 10 : 87322 - 87332
  • [10] An identity-based proxy re-encryption for data deduplication in cloud
    Kan, Ge
    Jin, Chunhua
    Zhu, Huihui
    Xu, Yongliang
    Liu, Nian
    [J]. JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 121