Identity Based Proxy Re-encryption Scheme (IBPRE+) for Secure Cloud Data Sharing

被引:7
作者
Wang, Xu An [1 ,2 ]
Xhafa, Fatos [3 ]
Zheng, Zhiheng [1 ]
Nie, Jinting [1 ]
机构
[1] Engn Univ Chinese Armed Police Force, Xian, Shannxi, Peoples R China
[2] Xidian Univ, Sch Cyber Engn, Xian, Shaanxi, Peoples R China
[3] Tech Univ Catalonia, Dept Comp Sci, Barcelona, Spain
来源
2016 8TH INTERNATIONAL CONFERENCE ON INTELLIGENT NETWORKING AND COLLABORATIVE SYSTEMS (INCOS) | 2016年
关键词
D O I
10.1109/INCoS.2016.83
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In proxy re-encryption (PRE), a proxy with re-encryption keys can transfer a ciphertext computed under Alice's public key into a new one, which can be decrypted by Bob only with his secret key. Recently, Wang et al. introduced the concept of PRE plus (PRE+) scheme, which can be seen as the dual of PRE, and is almost the same as PRE scheme except that the re-encryption keys are generated by the encrypter. Compared to PRE, PRE+ scheme can easily achieve this important property: the message-level based fine-grained delegation. In this paper, we extend the concept of PRE+ to the identity based setting. We propose a concrete IBPRE+ scheme based on 3-linear map and roughly discuss its properties. We also demonstrate potential application of this new primitive to secure cloud data sharing.
引用
收藏
页码:44 / 48
页数:5
相关论文
共 17 条
[1]  
[Anonymous], 2005, NDSS 2005
[2]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[4]  
Chiu YP, 2005, LECT NOTES COMPUT SC, V3783, P280
[5]   A solution for the management of multimedia sessions in hybrid clouds [J].
Dutu, Cristina ;
Apostol, Elena ;
Leordeanu, Catalin ;
Cristea, Valentin .
INTERNATIONAL JOURNAL OF SPACE-BASED AND SITUATED COMPUTING, 2014, 4 (02) :77-87
[6]   A secure delegation scheme of large polynomial computation in multi-party cloud [J].
Guo, Shu ;
Xu, Haixia .
International Journal of Grid and Utility Computing, 2015, 6 (01) :1-7
[7]  
Ivan Anca., 2003, NDSS 2003
[8]  
Kaitai Liang, 2013, Information Security Practice and Experience. 9th International Conference, ISPEC 2013. Proceedings, P132, DOI 10.1007/978-3-642-38033-4_10
[9]  
Liang K, 2014, LECT NOTES COMPUT SC, V8712, P257, DOI 10.1007/978-3-319-11203-9_15
[10]   A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing [J].
Liang, Kaitai ;
Au, Man Ho ;
Liu, Joseph K. ;
Susilo, Willy ;
Wong, Duncan S. ;
Yang, Guomin ;
Tran Viet Xuan Phuong ;
Xie, Qi .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (10) :1667-1680