File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1016/j.future.2014.11.016
- Scopus: eid_2-s2.0-84919491069
- WOS: WOS:000358807200011
- Find via
Supplementary
- Citations:
- Appears in Collections:
Article: A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
Title | A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing |
---|---|
Authors | |
Keywords | Adaptive chosen-ciphertext security Ciphertext-policy attribute-based encryption Ciphertext-policy attribute-based proxy re-encryption |
Issue Date | 2015 |
Citation | Future Generation Computer Systems, 2015, v. 52, p. 95-108 How to Cite? |
Abstract | © 2014 Elsevier B.V. Abstract Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data owner to delegate the access rights of the encrypted data stored on a cloud storage system to others without leaking the information of the data to the honest-but-curious cloud server. It provides effectiveness for data sharing as the data owner even using limited resource devices (e.g. mobile devices) can offload most of the computational operations to the cloud. Since its introduction many variants of PRE have been proposed. A Ciphertext-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE), which is regarded as a general notion for PRE, employs the PRE technology in the attribute-based encryption cryptographic setting such that the proxy is allowed to convert an encryption under an access policy to another encryption under a new access policy. CP-ABPRE is applicable to many network applications, such as network data sharing. The existing CP-ABPRE systems, however, leave how to achieve adaptive CCA security as an interesting open problem. This paper, for the first time, proposes a new CP-ABPRE to tackle the problem by integrating the dual system encryption technology with selective proof technique. Although the new scheme supporting any monotonic access structures is built in the composite order bilinear group, it is proven adaptively CCA secure in the standard model without jeopardizing the expressiveness of access policy. We further make an improvement for the scheme to achieve more efficiency in the re-encryption key generation and re-encryption phases. |
Persistent Identifier | http://hdl.handle.net/10722/280560 |
ISSN | 2023 Impact Factor: 6.2 2023 SCImago Journal Rankings: 1.946 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Liang, Kaitai | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Liu, Joseph K. | - |
dc.contributor.author | Susilo, Willy | - |
dc.contributor.author | Wong, Duncan S. | - |
dc.contributor.author | Yang, Guomin | - |
dc.contributor.author | Yu, Yong | - |
dc.contributor.author | Yang, Anjia | - |
dc.date.accessioned | 2020-02-17T14:34:21Z | - |
dc.date.available | 2020-02-17T14:34:21Z | - |
dc.date.issued | 2015 | - |
dc.identifier.citation | Future Generation Computer Systems, 2015, v. 52, p. 95-108 | - |
dc.identifier.issn | 0167-739X | - |
dc.identifier.uri | http://hdl.handle.net/10722/280560 | - |
dc.description.abstract | © 2014 Elsevier B.V. Abstract Proxy Re-Encryption (PRE) is a useful cryptographic primitive that allows a data owner to delegate the access rights of the encrypted data stored on a cloud storage system to others without leaking the information of the data to the honest-but-curious cloud server. It provides effectiveness for data sharing as the data owner even using limited resource devices (e.g. mobile devices) can offload most of the computational operations to the cloud. Since its introduction many variants of PRE have been proposed. A Ciphertext-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE), which is regarded as a general notion for PRE, employs the PRE technology in the attribute-based encryption cryptographic setting such that the proxy is allowed to convert an encryption under an access policy to another encryption under a new access policy. CP-ABPRE is applicable to many network applications, such as network data sharing. The existing CP-ABPRE systems, however, leave how to achieve adaptive CCA security as an interesting open problem. This paper, for the first time, proposes a new CP-ABPRE to tackle the problem by integrating the dual system encryption technology with selective proof technique. Although the new scheme supporting any monotonic access structures is built in the composite order bilinear group, it is proven adaptively CCA secure in the standard model without jeopardizing the expressiveness of access policy. We further make an improvement for the scheme to achieve more efficiency in the re-encryption key generation and re-encryption phases. | - |
dc.language | eng | - |
dc.relation.ispartof | Future Generation Computer Systems | - |
dc.subject | Adaptive chosen-ciphertext security | - |
dc.subject | Ciphertext-policy attribute-based encryption | - |
dc.subject | Ciphertext-policy attribute-based proxy re-encryption | - |
dc.title | A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing | - |
dc.type | Article | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1016/j.future.2014.11.016 | - |
dc.identifier.scopus | eid_2-s2.0-84919491069 | - |
dc.identifier.volume | 52 | - |
dc.identifier.spage | 95 | - |
dc.identifier.epage | 108 | - |
dc.identifier.isi | WOS:000358807200011 | - |
dc.identifier.issnl | 0167-739X | - |