Provably secure key-aggregate cryptosystems with auxiliary inputs for data sharing on the cloud

被引:13
作者
Wang, Zhiwei [1 ,2 ,3 ,4 ]
机构
[1] Nanjing Univ Posts & Telecommun, Sch Comp, Nanjing 210003, Jiangsu, Peoples R China
[2] Jiangsu Key Lab Big Data Secur & Intelligent Proc, Nanjing 210023, Jiangsu, Peoples R China
[3] Guangzhou Univ, Sch Math & Informat Sci, Key Lab Informat Secur, Guangzhou 510006, Guangdong, Peoples R China
[4] Shanghai Key Lab Informat Secur Integrated Manage, Shanghai 200240, Peoples R China
来源
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE | 2019年 / 93卷
基金
中国国家自然科学基金;
关键词
Key-aggregate cryptosystem; Data sharing; Auxiliary input; Provably secure; Cloud storage; IDENTITY-BASED ENCRYPTION; RESILIENT; CRYPTOGRAPHY;
D O I
10.1016/j.future.2017.09.041
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In the applications of Internet of Things (IoT), users usually do not believe that the cloud server is doing a good job of confidentiality, and thus the private data/documents are encrypted and maintained in the cloud storage. And then, fine-grained data sharing of these encrypted data for increased efficiency is an important requirement. Key-aggregate cryptosystem (KAC) has been proposed to address this problem, which can realize efficient delegation of decryption rights of any subset of ciphertexts. However, the end-devices of IoT may not have the special trusted hardware, and the stored keys are apt to be leaked by side-channel attacks. To solve this problem, we design two leakage-resilient KAC schemes, which can be proved secure with auxiliary input. We also implement these schemes over two platforms to test their applicability for the resource-constrained devices. (C) 2017 Elsevier B.V. All rights reserved.
引用
收藏
页码:770 / 776
页数:7
相关论文
共 21 条
[1]  
Akavik A, 2009, LECT NOTES COMPUT SC, V5444, P474
[2]  
Alwen J, 2010, LECT NOTES COMPUT SC, V6110, P113
[3]  
Alwen J, 2009, LECT NOTES COMPUT SC, V5677, P36, DOI 10.1007/978-3-642-03356-8_3
[4]  
Bo Yang, 2012, Provable Security. Proceedings of the 6th International Conference (ProvSec 2012), P125, DOI 10.1007/978-3-642-33272-2_9
[5]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[6]   Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage [J].
Chu, Cheng-Kang ;
Chow, Sherman S. M. ;
Tzeng, Wen-Guey ;
Zhou, Jianying ;
Deng, Robert H. .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (02) :468-477
[7]  
Di Crescenzo G, 2006, LECT NOTES COMPUT SC, V3876, P225
[8]   Storing Secrets on Continually Leaky Devices [J].
Dodis, Yevgeniy ;
Lewko, Allison ;
Waters, Brent ;
Wichs, Daniel .
2011 IEEE 52ND ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2011), 2011, :688-697
[9]   Cryptography Against Continuous Memory Attacks [J].
Dodis, Yevgeniy ;
Haralambiev, Kristiyan ;
Lopez-Alt, Adriana ;
Wichs, Daniel .
2010 IEEE 51ST ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, 2010, :511-520
[10]  
Dodis Y, 2010, LECT NOTES COMPUT SC, V5978, P361, DOI 10.1007/978-3-642-11799-2_22