An Identity-Based Conditional Proxy Re-Encryption in Cloud Computing Environments

Article Preview

Abstract:

In this paper, an identity-based conditional proxy re-encryption (PRE) scheme is proposed, where a delegator provides a re-encryption key satisfying one condition to a semi-trusted proxy who can convert a ciphertext encrypted under the delegator’s public key into one that can be decrypted using the delegatee’s private key. We address the identity-based proxy re-encryption scheme, where the delegator and the delegatee request keys from a trusted party known as a key generator center (KGC), who generates private keys for delegator and delegatee based on their identities. Meanwhile, the identity-based conditional proxy re-encryption scheme satisfies the properties of PRE including unidirectionality, non-interactivity and multi-hop. Additionally, the identity-based conditional proxy re-encryption scheme is efficient in terms of both the communication cost and the computing cost, and can realize security secret sharing in cloud computing environments.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

74-78

Citation:

Online since:

June 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Jinguang Han, Willy Susilo and Yi Mu. Identity-based data storage in cloud computing. Future Generation Computer Systems 29 (2013) 673–681.

DOI: 10.1016/j.future.2012.07.010

Google Scholar

[2] Adeela Waqar, Asad Raz and Haider Abbas, et al. A framework for preservation of cloud users' data privacy using dynamic reconstruction of metadata. Journal of Network and Computer Applications 36 (2013) 235–248.

DOI: 10.1016/j.jnca.2012.09.001

Google Scholar

[3] Jae Woo Seo, Dae Hyun Yum and Pil Joong Lee. Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles. Theoretical Computer Science 491 (2013) 83–93.

DOI: 10.1016/j.tcs.2012.11.026

Google Scholar

[4] Xu An Wang, Xinyi Huang and Xiaoyuan Yang. Further observation on proxy re-encryption with keyword search. The Journal of Systems and Software 85 (2012) 643– 654.

DOI: 10.1016/j.jss.2011.09.035

Google Scholar

[5] L. Fang, W. Susilo and J. Wang, Anonymous conditional proxy re-encryption without random oracle, in: Proc. of ProvSec 2009, in: LNCS, vol. 5848, Springer, Heidelberg, 2009, p.47–60.

DOI: 10.1007/978-3-642-04642-1_6

Google Scholar

[6] Li Ming Fang, Willy Susilo and Chun Peng Ge. Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theoretical Computer Science 462 (2012) 39–58.

DOI: 10.1016/j.tcs.2012.08.017

Google Scholar

[7] S. Chow, J. Weng, Y. Yang and R. Deng, Efficient unidirectional proxy re-encryption, in: Proc. of AFRICACRYPT 2010, in: LNCS, vol. 6055, Springer, Heidelberg, 2010, p.316–332.

DOI: 10.1007/978-3-642-12678-9_19

Google Scholar

[8] B. Libert, D. Vergnaud, Unidirectional chosen-ciphertext secure proxy re-encryption, IEEE Transactions on Information Theory 57 (3) (2011) 1786–1802. Full version of : http: /hal. inria. fr/inria-00339530/en.

DOI: 10.1109/tit.2011.2104470

Google Scholar

[9] Li Ming Fang, Willy Susilo and Chun Peng Ge. Hierarchical conditional proxy re-encryption. Computer Standards & Interfaces 34 (2012) 380–389.

DOI: 10.1016/j.csi.2012.01.002

Google Scholar

[10] Jun Shao, Zhenfu Cao and Xiaohui Liang. Proxy re-encryption with keyword search. Information Sciences 180 (2010) 2576–2587.

DOI: 10.1016/j.ins.2010.03.026

Google Scholar