Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing

被引:2
作者
He, Kai [1 ]
Liu, Xueqiao [2 ]
Yuan, Huaqiang [1 ]
Wei, Wenhong [1 ]
Liang, Kaitai [3 ]
机构
[1] Dongguan Univ Technol, Sch Comp & Network Secur, Dongguan 523808, Guangdong, Peoples R China
[2] Univ Wollongong, Sch Comp & Informat Technol, Wollongong, NSW 2512, Australia
[3] Univ Surrey, Dept Comp Sci, Guildford, Surrey, England
来源
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017 | 2017年 / 10701卷
基金
美国国家科学基金会;
关键词
Hierarchical conditional proxy re-encryption; Fine-grained data sharing; Identity-based encryption; Chosen-ciphertext security;
D O I
10.1007/978-3-319-72359-4_7
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Outsource local data to remote cloud has become prevalence for Internet users to date. While being unable to "handle" (outsourced) data at hand, Internet users may concern about the confidentiality of data but also further operations over remote data. This paper deals with the case where a secure data sharing mechanism is needed when data is encrypted and stored in remote cloud. Proxy re-encryption (PRE) is a promising cryptographic tool for secure data sharing. It allows a "honest-but-curious" third party (e.g., cloud server), which we call "proxy", to convert all ciphertexts encrypted for a delegator into those intended for a delegatee. The delegatee can further gain access to the plaintexts with private key, while the proxy learns nothing about the underlying plaintexts. Being regarded as a general extension of PRE, conditional PRE supports a fine-grained level of data sharing. In particular, condition is embedded into ciphertext that offers a chance for the delegator to generate conditional re-encryption key to control with which ciphertexts he wants to share. In this paper, for the first time, we introduce a new notion, called "hierarchical conditional" PRE. The new notion allows re-encryption rights to be "re-delegated" for "low-level" encrypted data. We propose the seminal scheme satisfying the notion in the context of identity-based encryption and further, prove it secure against chosen-ciphertext security.
引用
收藏
页码:118 / 135
页数:18
相关论文
共 42 条
  • [1] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
  • [2] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
  • [3] Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185
  • [4] Cryptographic Hierarchical Access Control for Dynamic Structures
    Castiglione, Arcangelo
    De Santis, Alfredo
    Masucci, Barbara
    Palmieri, Francesco
    Castiglione, Aniello
    Huang, Xinyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (10) : 2349 - 2364
  • [5] Hierarchical and Shared Access Control
    Castiglione, Arcangelo
    De Santis, Alfredo
    Masucci, Barbara
    Palmieri, Francesco
    Castiglione, Aniello
    Li, Jin
    Huang, Xinyi
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (04) : 850 - 865
  • [6] Chu CK, 2007, LECT NOTES COMPUT SC, V4779, P189
  • [7] Deng RH, 2008, LECT NOTES COMPUT SC, V5339, P1, DOI 10.1007/978-3-540-89641-8_1
  • [8] Interactive conditional proxy re-encryption with fine grain policy
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2293 - 2302
  • [9] Giuseppe A., 2005, P NETW DISTR SYST SE
  • [10] Green M, 2007, LECT NOTES COMPUT SC, V4521, P288