Skip to main content

2021 | OriginalPaper | Buchkapitel

Efficient Multi-receiver Certificate-Based Proxy Re-encryption Scheme for Secure Cloud Data Sharing

verfasst von : Jinmei Tian, Yang Lu, Fen Wang, Xuanang Yu

Erschienen in: Advances in Artificial Intelligence and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Sharing data through clouds has never been more economical and easier than now. To guarantee the confidentiality of the data stored in the cloud storages, the data owners should encrypt their sensitive data before uploading them to the clouds. But, traditional encryption paradigm makes it difficult for flexibly sharing encrypted data between different users. The paradigm of proxy re-encryption (PRE), which can securely delegate the decryption right from one user to another, offers an effective solution to the encrypted data sharing in the clouds. To share the encrypted data with multiple users efficiently and securely, we extend certificate-based PRE into the multi-receiver setting and put forward the notion of multi-receiver certificate-based PRE (MR-CBPRE). By using MR-CBPRE, a data owner can securely distribute his encrypted data to a group of users though public clouds in an efficient manner. We first formalize the syntax and security definition of MR-CBPRE, and then design a concrete MR-CBPRE scheme. In the random oracle model, the proposed scheme is proven to be chosen-ciphertext secure. To demonstrate the merits of our scheme, we analyze its performance by comparing it with the previous certificate-based PRE schemes which consist of only single receiver. As far as we know, it is the first certificate-based PRE scheme in the multi-receiver setting to date.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)CrossRef Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)CrossRef
3.
Zurück zum Zitat Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: 14th ACM Conference on Computer and Communications Security, pp. 185–194. ACM (2007) Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: 14th ACM Conference on Computer and Communications Security, pp. 185–194. ACM (2007)
13.
Zurück zum Zitat Zhu, J., Zhang, F., Song, X.: A new certificateless proxy re-encryption scheme. In: 2010 International Conference on Web Information Systems and Mining, pp. 53–58. IEEE (2010) Zhu, J., Zhang, F., Song, X.: A new certificateless proxy re-encryption scheme. In: 2010 International Conference on Web Information Systems and Mining, pp. 53–58. IEEE (2010)
14.
Zurück zum Zitat Xu, L., Wu, X., Zhang, X.: CL-PKE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: 7th ACM Symposium on Information, Computer and Communications Security, pp. 87–88. ACM (2012) Xu, L., Wu, X., Zhang, X.: CL-PKE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: 7th ACM Symposium on Information, Computer and Communications Security, pp. 87–88. ACM (2012)
16.
Zurück zum Zitat Wang, L., Chen, K., Mao, X., Wang, Y.: Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing. J. Shanghai Jiaotong University (Science) 1(9), 398–405 (2014)CrossRef Wang, L., Chen, K., Mao, X., Wang, Y.: Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing. J. Shanghai Jiaotong University (Science) 1(9), 398–405 (2014)CrossRef
17.
Zurück zum Zitat Sur, C., Park, Y., Shin, S.U., Rhee, K.H., Seo, C.: Certificate-based proxy re-encryption for public cloud storage. In: 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 159–166. IEEE, Heidelberg (2013) Sur, C., Park, Y., Shin, S.U., Rhee, K.H., Seo, C.: Certificate-based proxy re-encryption for public cloud storage. In: 7th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, pp. 159–166. IEEE, Heidelberg (2013)
19.
Zurück zum Zitat Galindo, D., Morillo, P., Ràfols, C.: Improved certificate-based encryption in the standard model. J. Syst. Softw. 81(7), 1218–1226 (2008)CrossRef Galindo, D., Morillo, P., Ràfols, C.: Improved certificate-based encryption in the standard model. J. Syst. Softw. 81(7), 1218–1226 (2008)CrossRef
21.
Zurück zum Zitat Lu, Y., Li, J., Xiao, J.: Constructing efficient certificate-based encryption with pairing. J. Comput. 4(1), 19–26 (2009)CrossRef Lu, Y., Li, J., Xiao, J.: Constructing efficient certificate-based encryption with pairing. J. Comput. 4(1), 19–26 (2009)CrossRef
22.
Zurück zum Zitat Shao, Z.: Enhanced certificate-based encryption from pairings. Comput. Electr. Eng. 37(2), 136–146 (2011)CrossRef Shao, Z.: Enhanced certificate-based encryption from pairings. Comput. Electr. Eng. 37(2), 136–146 (2011)CrossRef
23.
Zurück zum Zitat Wu, W., Mu, Y., Susilo, W., Huang, X., Xu, L.: A provably secure construction of certificate-based encryption from certificateless encryption. Comput. J. 55(10), 1157–1168 (2012)CrossRef Wu, W., Mu, Y., Susilo, W., Huang, X., Xu, L.: A provably secure construction of certificate-based encryption from certificateless encryption. Comput. J. 55(10), 1157–1168 (2012)CrossRef
24.
Zurück zum Zitat Yao, J., Li, J., Zhang, Y.: Certificate-based encryption scheme without pairing. KSII Trans. Internet Inf. Syst. 7(6), 1480–1491 (2013)CrossRef Yao, J., Li, J., Zhang, Y.: Certificate-based encryption scheme without pairing. KSII Trans. Internet Inf. Syst. 7(6), 1480–1491 (2013)CrossRef
27.
Zurück zum Zitat Lu, Y.: Efficient certificate-based proxy re-encryption scheme for data sharing in public clouds. KSII Trans. Internet Inf. Syst. 9(7), 2703–2718 (2015) Lu, Y.: Efficient certificate-based proxy re-encryption scheme for data sharing in public clouds. KSII Trans. Internet Inf. Syst. 9(7), 2703–2718 (2015)
31.
Zurück zum Zitat Sur, C., Jung, C.D., Rhee, K.H.: Multi-receiver certificate-based encryption and application to public key broadcast encryption. In: 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, pp. 35–40. IEEE (2007) Sur, C., Jung, C.D., Rhee, K.H.: Multi-receiver certificate-based encryption and application to public key broadcast encryption. In: 2007 ECSIS Symposium on Bio-inspired, Learning, and Intelligent Systems for Security, pp. 35–40. IEEE (2007)
32.
Zurück zum Zitat Fan, C., Tsai, P., Huang, J., Chen, W.T.: Anonymous multi-receiver certificate-based encryption. In: 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 19–26. IEEE (2013) Fan, C., Tsai, P., Huang, J., Chen, W.T.: Anonymous multi-receiver certificate-based encryption. In: 2013 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, pp. 19–26. IEEE (2013)
33.
Zurück zum Zitat Hafizul Islam, S.K., Khan, M.K., Al-Khouri, A.M.: Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Secur. Commun. Netw. 8(13), 2214–2231 (2015)CrossRef Hafizul Islam, S.K., Khan, M.K., Al-Khouri, A.M.: Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Secur. Commun. Netw. 8(13), 2214–2231 (2015)CrossRef
34.
Zurück zum Zitat Hung, Y.H., Huang, S.S., Tseng, Y.M., Tsai, T.T.: Efficient anonymous multireceiver certificateless encryption. IEEE Syst. J. 11(4), 2602–2613 (2017)CrossRef Hung, Y.H., Huang, S.S., Tseng, Y.M., Tsai, T.T.: Efficient anonymous multireceiver certificateless encryption. IEEE Syst. J. 11(4), 2602–2613 (2017)CrossRef
35.
Zurück zum Zitat Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: 1st ACM Conference on Communications and Computer Security, pp. 62–73. ACM (1993) Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: 1st ACM Conference on Communications and Computer Security, pp. 62–73. ACM (1993)
Metadaten
Titel
Efficient Multi-receiver Certificate-Based Proxy Re-encryption Scheme for Secure Cloud Data Sharing
verfasst von
Jinmei Tian
Yang Lu
Fen Wang
Xuanang Yu
Copyright-Jahr
2021
DOI
https://doi.org/10.1007/978-3-030-78618-2_49

Premium Partner