Skip to main content
Erschienen in:
Buchtitelbild

2019 | OriginalPaper | Buchkapitel

Elliptic Curve Qu-Vanstone Based Signcryption Schemes with Proxy Re-encryption for Secure Cloud Data Storage

verfasst von : Placide Shabisha, An Braeken, Abdellah Touhafi, Kris Steenhaut

Erschienen in: Cloud Computing and Big Data: Technologies, Applications and Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Data storage in cloud computing leads to several security issues such as data privacy, integrity, and authentication. Efficiency for the user to upload and download the data in a secure way plays an important role, as users are nowadays performing these actions on all types of devices, including e.g. smartphones. Signing and encryption of the sensitive data before hosting can solve potential security breaches. In this chapter, we propose two highly efficient identity based signcryption schemes. One of them is used as a building block for a proxy re-encryption scheme. This scheme allows users to store signed and encrypted data in the cloud, where the cloud server provider is able to check the authentication but not to derive the content of the message. When another user requests data access, the originator of the message first checks the authorization and then provides the cloud server with an encryption key to re-encrypt the stored data, enabling the requesting party to decrypt the resulting ciphertext and to validate the signature. The proposed scheme is based on elliptic curve operations and does not use computationally intensive pairing operations, like previous proposals.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology, vol. 196, pp. 47–53 (1984) Shamir, A.: Identity-based cryptosystems and signature schemes. In: Advances in Cryptology, vol. 196, pp. 47–53 (1984)
2.
Zurück zum Zitat Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, pp. 452–473 (2003)CrossRef Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, pp. 452–473 (2003)CrossRef
3.
Zurück zum Zitat Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 272–293 (2003) Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: International Conference on the Theory and Applications of Cryptographic Techniques, pp. 272–293 (2003)
4.
Zurück zum Zitat Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption). In: Annual International Cryptology Conference, pp. 165–179 (1997)CrossRef Zheng, Y.: Digital signcryption or how to achieve cost (signature & encryption) ≪ cost (signature) + cost (encryption). In: Annual International Cryptology Conference, pp. 165–179 (1997)CrossRef
5.
Zurück zum Zitat Le, M.-H., Hwang, S.O.: Certificate-based signcryption scheme without pairing: directly verifying signcrypted messages using a public key. ETRI J. 38(4), 724–734 (2016) Le, M.-H., Hwang, S.O.: Certificate-based signcryption scheme without pairing: directly verifying signcrypted messages using a public key. ETRI J. 38(4), 724–734 (2016)
6.
Zurück zum Zitat Lu, Y., Li, J.: Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks. Sci. World J. 2014, 12 p. (2014) Lu, Y., Li, J.: Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks. Sci. World J. 2014, 12 p. (2014)
7.
Zurück zum Zitat Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Proceedings of the Cryptology. LNCS, vol. 435, pp. 239–251 (1990) Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Proceedings of the Cryptology. LNCS, vol. 435, pp. 239–251 (1990)
9.
Zurück zum Zitat Boyen, X.: Multipurpose identity-based signcryption. In: Annual International Cryptology Conference, pp. 383–399 (2003)CrossRef Boyen, X.: Multipurpose identity-based signcryption. In: Annual International Cryptology Conference, pp. 383–399 (2003)CrossRef
10.
Zurück zum Zitat Pang, L., Li, H., Wang, Y.: nMIBAS: a novel multi-receiver ID-based anonymous signcryption with decryption fairness. Comput. Inf. 32(3), 441–460 (2013)MathSciNetMATH Pang, L., Li, H., Wang, Y.: nMIBAS: a novel multi-receiver ID-based anonymous signcryption with decryption fairness. Comput. Inf. 32(3), 441–460 (2013)MathSciNetMATH
11.
Zurück zum Zitat Li, F., Hu, Y., Zhang, C.: An identity-based signcryption scheme for multi-domain ad hoc networks. In: International Conference on ACNS, pp. 373–384 (2007) Li, F., Hu, Y., Zhang, C.: An identity-based signcryption scheme for multi-domain ad hoc networks. In: International Conference on ACNS, pp. 373–384 (2007)
12.
Zurück zum Zitat Zhang, B., Xu, Q.: An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model. In: AST/UCMA/ISA/CAN Conference, pp. 15–27 (2010) Zhang, B., Xu, Q.: An ID-based anonymous signcryption scheme for multiple receivers secure in the standard model. In: AST/UCMA/ISA/CAN Conference, pp. 15–27 (2010)
13.
Zurück zum Zitat Duan, S., Cao, Z.: Efficient and provably secure multireceiver identity-based signcryption. In: Australasian Conference on ACISP, pp. 195–206 (2006)CrossRef Duan, S., Cao, Z.: Efficient and provably secure multireceiver identity-based signcryption. In: Australasian Conference on ACISP, pp. 195–206 (2006)CrossRef
14.
Zurück zum Zitat Kim, I., Hwang, S.O.: Efficient identity-based broadcast signcryption schemes. Secur. Commun. Netw. 7(5), 914–925 (2014)CrossRef Kim, I., Hwang, S.O.: Efficient identity-based broadcast signcryption schemes. Secur. Commun. Netw. 7(5), 914–925 (2014)CrossRef
15.
Zurück zum Zitat Selvi, S.S.D., Vivek, S.S., Shukla, D., Chandrasekaran, P.R.: Efficient and provably secure certificateless multi-receiver signcryption. In: International Conference on ProvSec, pp. 52–67 (2008)CrossRef Selvi, S.S.D., Vivek, S.S., Shukla, D., Chandrasekaran, P.R.: Efficient and provably secure certificateless multi-receiver signcryption. In: International Conference on ProvSec, pp. 52–67 (2008)CrossRef
16.
Zurück zum Zitat Li, F., Xin, X., Hu, Y.: Efficient certificate-based signcryption scheme from bilinear pairings. Int. J. Comput. Appl. 30(2), 129–133 (2008) Li, F., Xin, X., Hu, Y.: Efficient certificate-based signcryption scheme from bilinear pairings. Int. J. Comput. Appl. 30(2), 129–133 (2008)
17.
Zurück zum Zitat Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: European Conference on Wireless Sensor Networks (EWSN 2008) (2008) Szczechowiak, P., Oliveira, L.B., Scott, M., Collier, M., Dahab, R.: NanoECC: testing the limits of elliptic curve cryptography in sensor networks. In: European Conference on Wireless Sensor Networks (EWSN 2008) (2008)
18.
Zurück zum Zitat Luo, M., Wen, Y., Zhao, H.: A certificate-based signcryption scheme. In: International Conference on Computer Science and Information Technology, pp. 17–23 (2008) Luo, M., Wen, Y., Zhao, H.: A certificate-based signcryption scheme. In: International Conference on Computer Science and Information Technology, pp. 17–23 (2008)
19.
Zurück zum Zitat Li, J., Huang, X., Honga, M., Zhanga, Y.: Certificate-based signcryption with enhanced security features. Comput. Math. Appl. 64(6), 1587–1601 (2012)MathSciNetCrossRef Li, J., Huang, X., Honga, M., Zhanga, Y.: Certificate-based signcryption with enhanced security features. Comput. Math. Appl. 64(6), 1587–1601 (2012)MathSciNetCrossRef
20.
Zurück zum Zitat Lu, Y., Li, J.: Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks. Sci. World J. 2014, 295419 (2014) Lu, Y., Li, J.: Efficient certificate-based signcryption secure against public key replacement attacks and insider attacks. Sci. World J. 2014, 295419 (2014)
21.
Zurück zum Zitat Singh, A.K.: A review of elliptic curve based signcryption schemes. Int. J. Comput. Appl. 102(6), 26–30 (2014) Singh, A.K.: A review of elliptic curve based signcryption schemes. Int. J. Comput. Appl. 102(6), 26–30 (2014)
22.
Zurück zum Zitat Braeken, A., Porambage, P.: Efficient generalized signcryption scheme based on ECC. Int. J. Cryptogr. Inf. Secur. (IJCIS) 5(2), 1–13 (2015) Braeken, A., Porambage, P.: Efficient generalized signcryption scheme based on ECC. Int. J. Cryptogr. Inf. Secur. (IJCIS) 5(2), 1–13 (2015)
23.
Zurück zum Zitat Braeken, A., Porambage, P.: ASEC: anonym signcryption scheme based on EC operations. Int. J. Comput. Appl. 5(7), 90–96 (2015) Braeken, A., Porambage, P.: ASEC: anonym signcryption scheme based on EC operations. Int. J. Comput. Appl. 5(7), 90–96 (2015)
24.
Zurück zum Zitat Certicom Research 2013, SEC4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme, Standards for Efficient Cryptography Group, Version 1.0, January 2013 Certicom Research 2013, SEC4: Elliptic Curve Qu-Vanstone Implicit Certificate Scheme, Standards for Efficient Cryptography Group, Version 1.0, January 2013
25.
Zurück zum Zitat Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2003). ISBN 038795273X Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, New York (2003). ISBN 038795273X
26.
Zurück zum Zitat Mambo, M., Okamoto, E.: Proxy cryptosystems: delegation of the power to decrypt ciphertexts. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 1, 54–63 (1997) Mambo, M., Okamoto, E.: Proxy cryptosystems: delegation of the power to decrypt ciphertexts. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 1, 54–63 (1997)
27.
Zurück zum Zitat Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Proceedings of ACNS 2007. LNCS, vol. 4521, pp. 288–306 (2007) Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Proceedings of ACNS 2007. LNCS, vol. 4521, pp. 288–306 (2007)
28.
Zurück zum Zitat Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Proceedings of ESORICS 2014. LNCS, vol. 8712, pp. 257–272 (2014) Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Proceedings of ESORICS 2014. LNCS, vol. 8712, pp. 257–272 (2014)
29.
Zurück zum Zitat Li, F., Liu, B., Hong, J.: An efficient signcryption for data access control in cloud computing. J. Comput. 99, 1–15 (2017)MathSciNetCrossRef Li, F., Liu, B., Hong, J.: An efficient signcryption for data access control in cloud computing. J. Comput. 99, 1–15 (2017)MathSciNetCrossRef
30.
Zurück zum Zitat Chandrasekar, S., Ambika, K., Rangan, C.P.: Signcryption with proxy re-encryption. Cryptology ePrint Archive, Report 2008/276 (2008) Chandrasekar, S., Ambika, K., Rangan, C.P.: Signcryption with proxy re-encryption. Cryptology ePrint Archive, Report 2008/276 (2008)
31.
Zurück zum Zitat Wang, C., Cao, X.: An improved signcryption with proxy re encryption and its application. In: Proceedings of CIS 2011, pp. 886–890 (2011) Wang, C., Cao, X.: An improved signcryption with proxy re encryption and its application. In: Proceedings of CIS 2011, pp. 886–890 (2011)
32.
Zurück zum Zitat Wang, H., Wang, C., Cao, H.: ID-based proxy re-signcryption scheme. In: Proceedings of CSAE 2011, pp. 317–321 (2011) Wang, H., Wang, C., Cao, H.: ID-based proxy re-signcryption scheme. In: Proceedings of CSAE 2011, pp. 317–321 (2011)
33.
Zurück zum Zitat Nabeel, M., Shang, N., Bertino, E.: Privacy preserving policy-based content sharing in public clouds. IEEE Trans. Knowl. Data Eng. 25(11), 2602–2614 (2013)CrossRef Nabeel, M., Shang, N., Bertino, E.: Privacy preserving policy-based content sharing in public clouds. IEEE Trans. Knowl. Data Eng. 25(11), 2602–2614 (2013)CrossRef
34.
Zurück zum Zitat Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.: Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Dependable Secure Comput. 9(6), 903–916 (2012)CrossRef Tang, Y., Lee, P.P.C., Lui, J.C.S., Perlman, R.: Secure overlay cloud storage with access control and assured deletion. IEEE Trans. Dependable Secure Comput. 9(6), 903–916 (2012)CrossRef
35.
Zurück zum Zitat Yang, K., Jia, X.: Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(7), 1735–1744 (2014)CrossRef Yang, K., Jia, X.: Expressive, efficient, and revocable data access control for multi-authority cloud storage. IEEE Trans. Parallel Distrib. Syst. 25(7), 1735–1744 (2014)CrossRef
36.
Zurück zum Zitat Hur, J.: Improving security and efficiency in attribute-based data sharing. IEEE Trans. Knowl. Data Eng. 25(10), 2271–2282 (2013)CrossRef Hur, J.: Improving security and efficiency in attribute-based data sharing. IEEE Trans. Knowl. Data Eng. 25(10), 2271–2282 (2013)CrossRef
39.
Zurück zum Zitat Brown, D.R., Gallant, R., Vanstone, S.A.: Provably secure implicit certificate schemes. In: Financial Cryptography, pp. 156–165. Springer, Heidelberg (2001)CrossRef Brown, D.R., Gallant, R., Vanstone, S.A.: Provably secure implicit certificate schemes. In: Financial Cryptography, pp. 156–165. Springer, Heidelberg (2001)CrossRef
40.
Zurück zum Zitat Chuang, Y.H., Tseng, Y.M.: An efficient dynamic group key agreement protocol for imbalanced wireless networks. Int. J. Netw. Manag. 20(4), 167–180 (2010) Chuang, Y.H., Tseng, Y.M.: An efficient dynamic group key agreement protocol for imbalanced wireless networks. Int. J. Netw. Manag. 20(4), 167–180 (2010)
41.
Zurück zum Zitat Dutta, R., Barua, R.: Provably secure constant round contributory group key agreement. IEEE Trans. Inf. Theory 54(5), 2007–2025 (2008)CrossRef Dutta, R., Barua, R.: Provably secure constant round contributory group key agreement. IEEE Trans. Inf. Theory 54(5), 2007–2025 (2008)CrossRef
42.
Zurück zum Zitat Baek, J., Steinfeld, R., Zheng, Y.: Formal proofs for the security of signcryption. J. Cryptol. 20(2), 203–235 (2007)MathSciNetCrossRef Baek, J., Steinfeld, R., Zheng, Y.: Formal proofs for the security of signcryption. J. Cryptol. 20(2), 203–235 (2007)MathSciNetCrossRef
Metadaten
Titel
Elliptic Curve Qu-Vanstone Based Signcryption Schemes with Proxy Re-encryption for Secure Cloud Data Storage
verfasst von
Placide Shabisha
An Braeken
Abdellah Touhafi
Kris Steenhaut
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-319-97719-5_1

Neuer Inhalt