Secure and Efficient Data Sharing Scheme Based on Certificateless Hybrid Signcryption for Cloud Storage

被引:20
作者
Luo, Wei [1 ]
Ma, Wenping [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
来源
ELECTRONICS | 2019年 / 8卷 / 05期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
cloud storage; data encryption; access control; authentication; certificateless hybrid signcryption; PROXY RE-ENCRYPTION; ACCESS-CONTROL; AUTHENTICATION;
D O I
10.3390/electronics8050590
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As cloud service providers are not completely trusted, people are increasingly concerned about security issues such as data confidentiality and user privacy. In many existing schemes, the private key generator (PKG) generates a full private key for each user, which means that the PKG can forge a valid signature or decrypt the ciphertext. To address the issue, we first present a novel certificateless hybrid signcryption (CL-HSC) scheme without pairing, in which the PKG only generates the partial private keys for users. It is provably secure under the Elliptic Curve Computational Diffie-Hellman (EC-CDH) assumption in the random oracle model. Then, we propose a key derivation method by which the data owner only needs to maintain the master key to get rid of the complex key management. By combining our proposed CL-HSC scheme and the key derivation method, we present a secure and efficient data-sharing scheme for cloud storage, which can resist collusion attacks, spoofing attacks, and replay attacks and makes user revocation easier. In addition, compared with some existing schemes, our scheme has a lower computational complexity.
引用
收藏
页数:12
相关论文
共 28 条
  • [1] Akshatha A, 2012, PROCEEDINGS OF 2012 IEEE INTERNATIONAL CONFERENCE ON CONDITION MONITORING AND DIAGNOSIS (IEEE CMD 2012), P336, DOI 10.1109/CMD.2012.6416447
  • [2] Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
  • [3] Barbosa M., 2008, P 2008 ACM S INF COM, P369, DOI DOI 10.1145/1368310.1368364
  • [4] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
  • [5] Deyan Chen, 2012, Proceedings of the 2012 International Conference on Computer Science and Electronics Engineering (ICCSEE 2012), P647, DOI 10.1109/ICCSEE.2012.193
  • [6] Green M, 2007, LECT NOTES COMPUT SC, V4521, P288
  • [7] Identity-based data storage in cloud computing
    Han, Jinguang
    Susilo, Willy
    Mu, Yi
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (03): : 673 - 681
  • [8] PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks
    Huang, Qinlong
    Yang, Yixian
    Fu, Jingyi
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 86 : 1523 - 1533
  • [9] Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems
    Hur, Junbeom
    Noh, Dong Kun
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2011, 22 (07) : 1214 - 1221
  • [10] Attacks on fast double block length hash functions
    Knudsen, LR
    Lai, XJ
    Preneel, B
    [J]. JOURNAL OF CRYPTOLOGY, 1998, 11 (01) : 59 - 72