Revocable Certificateless Encryption with Ciphertext Evolution

被引:3
作者
Sun, Yinxia [1 ]
Zhang, Futai [1 ]
Fu, Anmin [2 ]
机构
[1] Nanjing Normal Univ, Sch Comp Sci & Technol, Nanjing 210023, Peoples R China
[2] Nanjing Univ Sci & Technol, Sch Comp Sci & Engn, Nanjing 210094, Peoples R China
来源
INFORMATION SECURITY AND PRIVACY | 2018年 / 10946卷
关键词
Certificateless; Revocable; Ciphertext evolution; Cloud storage; SECURE;
D O I
10.1007/978-3-319-93638-3_42
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The user revocation of certificateless cryptosystems is an important issue. One of the existing solutions is to issue extra time keys periodically for every non-revoked user. However, since the scheme requires different time keys to decrypt data for different time periods, the user needs to hold a long list of time keys (linear growth with time), which is inefficient in practical applications. Moreover, the ciphertexts produced before revocation are still available to the revoked users, which is not acceptable in most applications such as cloud storage. To overcome these shortcomings, in this paper, we present an efficient solution called revocable certificateless encryption with ciphertext evolution. In our scheme, a current time key together with a private key are enough for the decryptions by non-revoked users. Meanwhile, revoked users cannot make decryptions on ciphertexts in the past any more. We give formal security proofs based on the IND-CPA model under the standard BDH problem.
引用
收藏
页码:741 / 749
页数:9
相关论文
共 19 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
[Anonymous], THESIS
[3]  
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[4]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[5]  
Chow SSM, 2006, LECT NOTES COMPUT SC, V3958, P508
[6]  
Dent AW, 2008, LECT NOTES COMPUT SC, V4939, P344, DOI 10.1007/978-3-540-78440-1_20
[7]   Privacy-preserving certificateless provable data possession scheme for big data storage on cloud [J].
He, Debiao ;
Kumar, Neeraj ;
Wang, Huaqun ;
Wang, Lina ;
Choo, Kim-Kwang Raymond .
APPLIED MATHEMATICS AND COMPUTATION, 2017, 314 :31-43
[8]   Lattice-Based Revocable Certificateless Signature [J].
Hung, Ying-Hao ;
Tseng, Yuh-Min ;
Huang, Sen-Shan .
SYMMETRY-BASEL, 2017, 9 (10)
[9]  
Ju HS, 2005, LECT NOTES ARTIF INT, V3682, P453
[10]   Server-Aided Revocable Identity-Based Encryption from Lattices [J].
Khoa Nguyen ;
Wang, Huaxiong ;
Zhang, Juanyang .
CRYPTOLOGY AND NETWORK SECURITY, CANS 2016, 2016, 10052 :107-123