Skip to main content
Top

2019 | OriginalPaper | Chapter

Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation

Authors : Mingwu Zhang, Yan Jiang, Hua Shen, Bingbing Li, Willy Susilo

Published in: Information Security and Cryptology

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A cloud-based re-encryption scheme allows a semi-trusted cloud proxy to convert a ciphertext under delegator’s public-key into a ciphertext of delegatee’s. However, for an untrusted cloud proxy, as the re-encryption program was outsourced on the cloud, the cloud can debug the program and might have illegal activities in practice, such as monitoring the program executing, returning an incorrect re-encryption ciphertext, or colluding with the participants to obtain the sensitive information. In this work, we propose a construction of cloud-based verifiable re-encryption by incorporating new cryptographic primitives of indistinguishability obfuscation and puncturable pseudorandom functions, which can achieve the master-secret security even if the proxy colludes with the delegatee. Furthermore, our scheme can provide the white-box security in re-encryption procedure to implement the sensitive-data protection in the presence of white-box access, and it resists on chosen-ciphertext attacks in both the first-level encryption and the second-level encryption. The decryption is very efficient since it only requires several symmetric PRF operations, which can be deployed and applied in the light-weight security device such as Mobile Phones (MPs), Wireless Body Area Networks (WBANs) and nodes in Internet-of-Things (IoTs).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Asharov, G., Segev, G.: Limits on the power of indistinguishability obfuscation and functional encryption. In: 56th FOCS 2015, pp. 191–209 (2015) Asharov, G., Segev, G.: Limits on the power of indistinguishability obfuscation and functional encryption. In: 56th FOCS 2015, pp. 191–209 (2015)
2.
go back to reference Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)CrossRef Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)CrossRef
7.
go back to reference Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 185–194. ACM (2007) Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 185–194. ACM (2007)
8.
go back to reference Chen, M.R., Zhang, X., Li, X.: Comments on Shao-Cao’s unidirectional proxy re-encryption scheme from PKC 2009. J. Inf. ci. Eng. 27(3), 1153–1158 (2011)MathSciNet Chen, M.R., Zhang, X., Li, X.: Comments on Shao-Cao’s unidirectional proxy re-encryption scheme from PKC 2009. J. Inf. ci. Eng. 27(3), 1153–1158 (2011)MathSciNet
10.
go back to reference Cohen, A., Holmgren, J., Nishimaki, R., Vaikuntanathan, V., Wichs, D.: Watermarking cryptographic capabilities. In: 48th ACM STOC 2016, pp. 1115–1127 (2016) Cohen, A., Holmgren, J., Nishimaki, R., Vaikuntanathan, V., Wichs, D.: Watermarking cryptographic capabilities. In: 48th ACM STOC 2016, pp. 1115–1127 (2016)
11.
go back to reference Gentry, C., Lewko, A.B., Sahai, A., Waters, B.: Indistinguishability obfuscation from the multilinear subgroup elimination assumption. In: FOCS 2015, pp. 151–170 (2015) Gentry, C., Lewko, A.B., Sahai, A., Waters, B.: Indistinguishability obfuscation from the multilinear subgroup elimination assumption. In: FOCS 2015, pp. 151–170 (2015)
12.
13.
go back to reference Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B.: Candidate indistinguishability obfuscation and functional encrytion for all circuits. In: FOCS 2013, pp. 40–49. IEEE (2013) Garg, S., Gentry, C., Halevi, S., Raykova, M., Sahai, A., Waters, B.: Candidate indistinguishability obfuscation and functional encrytion for all circuits. In: FOCS 2013, pp. 40–49. IEEE (2013)
14.
go back to reference Gaurav, P., Purushothama, B.R.: Proxy visible re-encryption scheme with application to e-mail forwarding. In: Proceedings of the 10th International Conference on Security of Information and Networks (SIN 2017), pp. 212–217 (2017) Gaurav, P., Purushothama, B.R.: Proxy visible re-encryption scheme with application to e-mail forwarding. In: Proceedings of the 10th International Conference on Security of Information and Networks (SIN 2017), pp. 212–217 (2017)
15.
go back to reference Gaurav, P., Purushothama, B.R.: On efficient access control mechanisms in hierarchy using unidirectional and transitive proxy re-encryption schemes. In: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), pp. 519–524 (2017) Gaurav, P., Purushothama, B.R.: On efficient access control mechanisms in hierarchy using unidirectional and transitive proxy re-encryption schemes. In: Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), pp. 519–524 (2017)
27.
go back to reference Sahai, A., Waters, B.: How to use indistinguishability obfuscation: deniable encryption, and more. In: STOC 2014, pp. 475–484. ACM (2014) Sahai, A., Waters, B.: How to use indistinguishability obfuscation: deniable encryption, and more. In: STOC 2014, pp. 475–484. ACM (2014)
28.
go back to reference Zhang, M., Jiang, Y., Mu, Y., Susilo, W.: Obfuscating re-encryption algorithm with flexible and controllable multi-hop on untrusted outsourcing server. IEEE Access 5(1), 26419–26434 (2017)CrossRef Zhang, M., Jiang, Y., Mu, Y., Susilo, W.: Obfuscating re-encryption algorithm with flexible and controllable multi-hop on untrusted outsourcing server. IEEE Access 5(1), 26419–26434 (2017)CrossRef
29.
go back to reference Zhang, M., Yao, Y., Li, B., Tang, C.: Accountable mobile e-commerce scheme in intelligent cloud system transactions. J. Ambient Intell. Humaniz. Comput. 9(6), 1889–1899 (2018)CrossRef Zhang, M., Yao, Y., Li, B., Tang, C.: Accountable mobile e-commerce scheme in intelligent cloud system transactions. J. Ambient Intell. Humaniz. Comput. 9(6), 1889–1899 (2018)CrossRef
Metadata
Title
Cloud-Based Data-Sharing Scheme Using Verifiable and CCA-Secure Re-encryption from Indistinguishability Obfuscation
Authors
Mingwu Zhang
Yan Jiang
Hua Shen
Bingbing Li
Willy Susilo
Copyright Year
2019
DOI
https://doi.org/10.1007/978-3-030-14234-6_13

Premium Partner