A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage

被引:3
作者
Luo, Wei [1 ]
Ma, Wenping [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
来源
CLOUD COMPUTING AND SECURITY, PT II | 2018年 / 11064卷
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Cloud storage; Data security; Identity-based encryption; Proxy re-encryption; Access control;
D O I
10.1007/978-3-030-00009-7_47
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Identity-based encryption algorithm is applied to cloud storage to protect data security and provide a flexible access control scheme. However, in the existing schemes, the private key generator (PKG) knows secret keys of all users, which means that the PKG can decrypt all ciphertexts. In this paper, we propose a secure identity-based proxy re-encryption scheme, in which the PKG only generates partial secret keys for users. This can ensure users' data confidentiality and privacy security. Its security is based on the decision bilinear Diffie-Hellman (DBDH) assumption in the random oracle model. Besides, our scheme can resist collusion attacks and support user revocation. In addition, we compare our scheme with other existing schemes. The result demonstrates our scheme is comparable with other schemes in computation complexity.
引用
收藏
页码:519 / 530
页数:12
相关论文
共 12 条
[1]  
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]  
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[3]  
Chu CK, 2007, LECT NOTES COMPUT SC, V4779, P189
[4]  
Green M, 2007, LECT NOTES COMPUT SC, V4521, P288
[5]   Identity-based data storage in cloud computing [J].
Han, Jinguang ;
Susilo, Willy ;
Mu, Yi .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (03) :673-681
[6]  
Liang K, 2014, LECT NOTES COMPUT SC, V8712, P257, DOI 10.1007/978-3-319-11203-9_15
[7]  
Matsuo T, 2007, LECT NOTES COMPUT SC, V4575, P247
[8]  
Seo JH, 2013, LECT NOTES COMPUT SC, V7778, P216, DOI 10.1007/978-3-642-36362-7_14
[9]  
Shamir A., 1985, ADV CRYPTOLOGY, P47, DOI 10.1007/3-540-39568-7_5
[10]  
Tang Q, 2009, LECT NOTES COMPUT SC, V5487, P332, DOI 10.1007/978-3-642-01440-6_26