A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage

被引:40
作者
Zeng, Peng [1 ]
Choo, Kim-Kwang Raymond [2 ,3 ]
机构
[1] East China Normal Univ, Shanghai Key Lab Trustworthy Comp, Shanghai 200062, Peoples R China
[2] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[3] Univ Texas San Antonio, Dept Elect & Comp Engn, San Antonio, TX 78249 USA
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
Secure cloud storage; conditional proxy re-encryption; sender-specified proxy re-encryption; IND-CPA; IND-CCA; MULTIUSE; SCHEME;
D O I
10.1109/ACCESS.2018.2879479
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Secure cloud storage has important applications in our big data-driven society, and to achieve secure cloud storage, we need to enforce strong access control mechanism. Proxy re-encryption (PRE) has been shown to be an effective tool of constructing cryptographically enforced access control schemes. In a traditional PRE scheme, a semi-trusted proxy can convert all ciphertexts for a delegator to cipher-texts for a delegatee once the proxy obtains the relevant re-encryption key from the delegator. In many practical applications, however, a fine-grained delegation of decryption abilities may be demanded, and thus, the notion of conditional PRE (C-PRE) is introduced, which allows only the ciphertexts satisfying a concrete condition to be converted by the proxy. In this paper, we introduce a special kind of C-PRE, sender-specified PRE (SS-PRE), which enables the delegator to delegate the decryption right of the ciphertexts from a specified sender to his/her delegatee. We give a formal definition of SS-PRE and its security model. We also provide the concrete constructions of an IND-CPA secure SS-PRE scheme and an IND-CCA secure SS-PRE scheme with the properties of unidirectionality and single-use and prove the security of both schemes in the standard model. The detailed analysis shows that our new IND-CCA secure SS-PRE scheme achieves a higher efficiency in computation cost and ciphertext size than the conventional C-PRE schemes.
引用
收藏
页码:70017 / 70024
页数:8
相关论文
共 29 条
[1]  
Abirami N., 2017, GLOBAL J PURE APPL M, V13, P3455
[2]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[4]  
Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185
[5]  
Coron JS, 2000, LECT NOTES COMPUT SC, V1880, P229
[6]   A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system [J].
Ge, Chunpeng ;
Susilo, Willy ;
Fang, Liming ;
Wang, Jiandong ;
Shi, Yunqing .
DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (11) :2587-2603
[7]  
Green M, 2007, LECT NOTES COMPUT SC, V4521, P288
[8]   Securely Obfuscating Re-Encryption [J].
Hohenberger, Susan ;
Rothblum, Guy N. ;
Shelat, Abhi ;
Vaikuntanathan, Vinod .
JOURNAL OF CRYPTOLOGY, 2011, 24 (04) :694-719
[9]   Secure Data Group Sharing and Dissemination with Attribute and Time Conditions in Public Cloud [J].
Huang, Qinlong ;
Yang, Yixian ;
Fu, Jingyi .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2021, 14 (04) :1013-1025
[10]   Secure Identity-Based Data Sharing and Profile Matching for Mobile Healthcare Social Networks in Cloud Computing [J].
Huang, Qinlong ;
Yue, Wei ;
He, Yue ;
Yang, Yixian .
IEEE ACCESS, 2018, 6 :36584-36594