Fine-Grained Conditional Proxy Re-Encryption and Application

被引:0
作者
Yang, Yanjiang [1 ]
Lu, Haibing [2 ]
Weng, Jian [3 ,5 ]
Zhang, Youcheng [4 ]
Sakurai, Kouichi [5 ]
机构
[1] Inst Infocomm Res, Singapore, Singapore
[2] Santa Clara Univ, Leavey Sch Business, Santa Clara, CA USA
[3] Jinan Univ, Dept Comp Sci, Jinan, Peoples R China
[4] Nanjing Unary Informat Technol Co Ltd, Nanjing, Peoples R China
[5] Kyushu Univ, Dept Informat, Kyushu, Japan
来源
PROVABLE SECURITY, PROVSEC 2014 | 2014年 / 8782卷
基金
美国国家科学基金会;
关键词
Conditional proxy re-encryption; Attribute-based encryption; User revocation; Cloud data; ATTRIBUTE-BASED ENCRYPTION; DELEGATION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conditional proxy re-encryption (CPRE) enables delegation of decryption rights, and is useful in many applications. In this paper, we present a ciphertext-policy attribute based CPRE scheme, together with a formalization of the primitive and its security proof. We further propose applying the scheme for fine-grained encryption of cloud data. This application well implements the idea of cloud-enabled user revocation, offering an alternative yet more feasible solution to the user revocation issue when using attribute based encryption over cloud data. Features of the application include little cost in case of user revocation, and high user-side efficiency when users access cloud data.
引用
收藏
页码:206 / 222
页数:17
相关论文
共 50 条
  • [1] Cloud based data sharing with fine-grained proxy re-encryption
    Yang, Yanjiang
    Zhu, Haiyan
    Lu, Haibing
    Weng, Jian
    Zhang, Youcheng
    Choo, Kim-Kwang Raymond
    PERVASIVE AND MOBILE COMPUTING, 2016, 28 : 122 - 134
  • [2] Efficient Fine-Grained Data Sharing Based on Proxy Re-Encryption in IIoT
    Zhang, Qingyang
    Fu, Yujie
    Cui, Jie
    He, Debiao
    Zhong, Hong
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (06) : 5797 - 5809
  • [3] Interactive conditional proxy re-encryption with fine grain policy
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2293 - 2302
  • [4] On the Security of a Conditional Proxy Re-Encryption
    Zhang, Xi
    Chen, Min-Rong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10) : 2644 - 2647
  • [5] Conditional Proxy Broadcast Re-Encryption
    Chu, Cheng-Kang
    Weng, Jian
    Chow, Sherman S. M.
    Zhou, Jianying
    Deng, Robert H.
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 327 - +
  • [6] Proxy re-encryption for fine-grained access control: Its applicability, security under stronger notions and performance
    Pareek, Gaurav
    Purushothama, B. R.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [7] Proxy Impersonation Safe Conditional Proxy Re-Encryption
    Gandhi, Dheeraj
    Rangan, Pandu
    Selvi, Sharmila Deva
    Vivek, Sree
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 33 - 44
  • [8] Identity-based conditional proxy re-encryption with fine grain policy
    Ge, Chunpeng
    Susilo, Willy
    Wang, Jiandong
    Fang, Liming
    COMPUTER STANDARDS & INTERFACES, 2017, 52 : 1 - 9
  • [9] Anonymous Attribute-Based Conditional Proxy Re-encryption
    Mao, Xianping
    Li, Xuefeng
    Wu, Xiaochuan
    Wang, Chuansheng
    Lai, Junzuo
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 95 - 110
  • [10] Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
    Yan, Xixi
    Zhang, Jing
    Cheng, Pengyu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 83 (01): : 1399 - 1414