An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
read more
Citations
A Privacy-Preserving Vehicular Crowdsensing-Based Road Surface Condition Monitoring System Using Fog Computing
Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things
SeDaSC: Secure Data Sharing in Clouds
Provably Secure and Lightweight Certificateless Signature Scheme for IIoT Environments
Secure Data Sharing and Searching at the Edge of Cloud-Assisted Internet of Things
References
Identity-Based Encryption from the Weil Pairing
Ciphertext-Policy Attribute-Based Encryption
Attribute-based encryption for fine-grained access control of encrypted data
Fuzzy identity-based encryption
A digital signature scheme secure against adaptive chosen-message attacks
Related Papers (5)
Frequently Asked Questions (11)
Q2. What is the basic concept of the mediated cryptography?
The basic concept of the mediated cryptography is to utilize a security mediator (SEM) which can control security capabilities for every transaction.
Q3. What is the role of the security mediator?
The security mediator acts as a policy enforcement point as well and supports instantaneous revocation of compromised or malicious users.
Q4. What is the function that can be used to replace the public key of a user IDi?
Public Key Replacement: AI can replace the public key of any user IDi, (Ui, w0i, w1i, d1i) with any value (U′i, w ′ 0i, w ′ 1i, d ′ 1i ) of its choice.
Q5. What is the common approach to encrypting data?
In order to assure confidentiality of sensitive data stored in public clouds, a commonly adopted approach is to encrypt the data before uploading it to the cloud.
Q6. How does the SEM store the partially decrypted data?
In order to improve the efficiency of the system, once the initial partial decryption for each user is performed, the SEM stores back the partially decrypted data in the cloud storage.
Q7. What is the cost of the encryption algorithm?
As the bit length of q increases, the cost increases non-linearly since the encryption algorithm performs exponentiation operations.
Q8. What is the SEM-key used to decrypt a message?
• SEM-Decrypt: Given the ciphertext C = (C1, C2, C3), a IDA, A’s public keys (UA, w0, w1, d1), SEM performs the following steps using the SEM-key d0:1)
Q9. Why have organizations been adopting public cloud storage?
DUE TO the benefits of public cloud storage, organiza-tions have been adopting public cloud services such as Microsoft Skydrive [18] and Dropbox [11] to manage their data.
Q10. Why is the CA required to generate its own signature on each user’s public key?
Because the CA has to generate its own signature on each user’s public key and manage each user’s certificate, the overall certificate management is very expensive and complex.
Q11. What is the way to have the key generation and management functionality deployed in the untrusted?
Their approach allows one to have most of the key generation and management functionality deployed in the untrusted cloud as their mCL-PKE scheme does not have the problem of key escrowing and thus the KGC is unable to learn the full private keys of users.