Anonymous hierarchical identity-based encryption with delegated traceability for cloud-based data sharing systems

被引:2
作者
Liu, Zi-Yuan [1 ,3 ]
Mambo, Masahiro [2 ]
Tso, Raylin [3 ]
Tseng, Yi-Fan [3 ]
机构
[1] Kanazawa Univ, Grad Sch Nat Sci & Technol, Kanazawa 9201192, Japan
[2] Kanazawa Univ, Inst Sci & Engn, Kanazawa 9201192, Japan
[3] Natl Chengchi Univ, Dept Comp Sci, Taipei 11605, Taiwan
关键词
Adaptive security; Cloud computing; Data sharing; Hierarchical delegation; Identity-based encryption; ONE-TIME SIGNATURES; SECURITY; HIBE; IBE;
D O I
10.1016/j.csi.2023.103817
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud-based data sharing systems (DSS) have become prevalent due to their ample storage and convenient access control. To protect sensitive data privacy in DSS, anonymous identity-based encryption (IBE) is a promising approach, enabling encryption using a recipient's identity as a public key, while preventing identity and data leaks out of ciphertexts. As complete anonymity risks abuse and illegal usage, Blazy et al. introduced the notion called anonymous IBE with traceable identities (AIBET) at ARES'19, allowing users with tracing keys to identify recipients from ciphertexts. Unfortunately, existing AIBET schemes lack tracing key delegation and only consider security in weaker models (i.e., selective-identity attacks and chosen-plaintext attacks), posing risks of inconvenience and user privacy leaks. In this paper, we introduce a novel notion called anonymous hierarchical identity-based encryption with delegated traceability (AHIBEDT) for DSS. We formalize its syntax and define security notions in stronger models (i.e., adaptive-identity attacks and chosen-ciphertext attacks). In addition, we demonstrate that a concrete AHIBEDT scheme can be simply obtained from a hierarchical IBE scheme and a one-time signature scheme. The comparison results indicate that, despite a substantial increase in communication and computational costs, our approach achieves better security and functionality.
引用
收藏
页数:14
相关论文
共 60 条
[1]   Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions [J].
Abdalla, Michel ;
Bellare, Mihir ;
Catalano, Dario ;
Kiltz, Eike ;
Kohno, Tadayoshi ;
Lange, Tanja ;
Malone-Lee, John ;
Neven, Gregory ;
Paillier, Pascal ;
Shi, Haixia .
JOURNAL OF CRYPTOLOGY, 2008, 21 (03) :350-391
[2]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
[3]  
Agrawal S, 2010, LECT NOTES COMPUT SC, V6110, P553
[4]   Charm: a framework for rapidly prototyping cryptosystems [J].
Akinyele, Joseph A. ;
Garman, Christina ;
Miers, Ian ;
Pagano, Matthew W. ;
Rushanan, Michael ;
Green, Matthew ;
Rubin, Aviel D. .
JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2013, 3 (02) :111-128
[5]  
Bellare M, 1998, LECT NOTES COMPUT SC, V1462, P26, DOI 10.1007/BFb0055718
[6]  
Bellare M., 1993, CCS 93, P62, DOI DOI 10.1145/168588.168596
[7]  
Bellare M, 2011, LECT NOTES COMPUT SC, V6597, P235, DOI 10.1007/978-3-642-19571-6_15
[8]   Anonymous Identity Based Encryption with Traceable Identities [J].
Blazy, Olivier ;
Brouilhet, Laura ;
Duong Hieu Phan .
14TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2019), 2019,
[9]  
Blazy O, 2014, LECT NOTES COMPUT SC, V8616, P408, DOI 10.1007/978-3-662-44371-2_23
[10]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3152, P443