A Quantum secure sharing protocol for Cloud data based on proxy re-encryption

被引:3
|
作者
Chang, Yan [1 ]
Zhang, Shi-Bin [1 ]
Yan, Li-Li [1 ]
Wan, Guo-gen [1 ]
机构
[1] Chengdu Univ Informat Technol, Sch Cybersecur, Chengdu 610225, Peoples R China
关键词
D O I
10.1038/s41598-020-65738-y
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
A quantum scheme for cloud data sharing based on proxy re-encryption is proposed. The user Alice stores the cipher-text of her data on cloud data center. When Alice wants to share her data with another user Bob, Alice is called the delegator and Bob is called the delegatee. The cloud service provider (called the proxy) can convert the delegator's cipher-text into the delegatee's cipher-text without decrypting the former, so that the delegatee can get the plain-text of Alice's data with his private key. The proxy cannot obtain the plain-text of the user's data stored on cloud data center. Delegator in the protocol should have the ability of producing Bell states, performing Bell basis and Z-basis measurements, and storing qubits. The quantum requirements for the delegatee are reduced. The delegatee needs to have the ability of reflecting and performing Z-basis measurement. One secret at a time (one-time one-pad) is theoretically implemented, especially when the same data is shared multiple times. The anti-selection plain-text attack security and the anti-selective cipher-text attack security are realized. Fine-granularity secret data sharing is achieved flexibly.
引用
收藏
页数:8
相关论文
共 50 条
  • [1] A Quantum secure sharing protocol for Cloud data based on proxy re-encryption
    Yan Chang
    Shi-Bin Zhang
    Li-Li Yan
    Guo-gen Wan
    Scientific Reports, 10
  • [2] Secure Data Sharing in the Cloud Through Proxy Re-Encryption Technique
    Adilakshmi, Jyothi
    Rithika, Badgoian
    Pushpalatha, Chitikela
    Venkatesh, Thurpati
    Lohitha, Mandapati
    2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 700 - 705
  • [3] Accountable Proxy Re-Encryption for Secure Data Sharing
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    Lan, Xiao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 145 - 159
  • [4] Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing
    Wang, Xu An
    Yang, Xiaoyuan
    Li, Cong
    Liu, Yudong
    Ding, Yong
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2018, 15 (03) : 585 - 614
  • [5] A proxy broadcast re-encryption for cloud data sharing
    Sun, Maosheng
    Ge, Chunpeng
    Fang, Liming
    Wang, Jiandong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 10455 - 10469
  • [6] A proxy broadcast re-encryption for cloud data sharing
    Maosheng Sun
    Chunpeng Ge
    Liming Fang
    Jiandong Wang
    Multimedia Tools and Applications, 2018, 77 : 10455 - 10469
  • [7] Identity Based Proxy Re-encryption Scheme (IBPRE+) for Secure Cloud Data Sharing
    Wang, Xu An
    Xhafa, Fatos
    Zheng, Zhiheng
    Nie, Jinting
    2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS), 2016, : 44 - 48
  • [8] Verifiable attribute-based proxy re-encryption for secure public cloud data sharing
    Lin, Suqing
    Zhang, Rui
    Wang, Mingsheng
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1748 - 1758
  • [9] Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
    Liu, Qin
    Wang, Guojun
    Wu, Jie
    INFORMATION SCIENCES, 2014, 258 : 355 - 370
  • [10] Conditional Proxy Re-Encryption for Secure Big Data Group Sharing in Cloud Environment
    Son, Junggab
    Kim, Donghyun
    Hussain, Rasheed
    Oh, Heekuck
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 541 - 546