Identity-Based Encryption with Outsourced Revocation in Cloud Computing
read more
Citations
Secure attribute-based data sharing for resource-limited users in cloud computing
A survey on cloud computing security
Security in Internet of Things: issues, challenges, taxonomy, and architecture
Privacy-preserving outsourced classification in cloud computing
A lightweight multi-layer authentication protocol for wireless body area networks
References
The NIST Definition of Cloud Computing
A view of cloud computing
Identity-Based Encryption from the Weil Pairing
Identity-based cryptosystems and signature schemes
Identity-Based Encryption from the Weil Pairing
Related Papers (5)
Frequently Asked Questions (12)
Q2. What is the key update algorithm used by KU-CSP?
The key update algorithm run by KU-CSP takes as input – a revocation list RL, an identity ID, a time period Ti+1 and the outsourcing key OKID for identity ID.
Q3. What is the typical example of IaaS?
Typical IaaS examples are Amazon EC2 and S3 where computing and storage infrastructure are open to public access in a utility fashion.
Q4. What is the advantage of the BGK scheme over the previous work?
Besides the better performance in efficiency and private key size, another advantage of their scheme over the previous work [5] is that it supports dynamic number of users.
Q5. What is the challenge in designing the outsourced revocable IBE scheme?
The challenge in designing the outsourced revocable IBE scheme is how to prevent a collusion between Bob and other unrevoked dishonest users.
Q6. What is the advantage of RDoC over traditional model?
One of the most advantages of RDoC over traditional model with single server is that the security risk on the single server is reduced to multiple servers involved in.
Q7. Why does the previous approach have an increasing private key size?
Due to the same reason of demanding for computation on all the nodes in path from leaf node to root node, the previous approach [5] has an increasing private key size, whereas ours achieves constant key size (nearly four element in group G).
Q8. What is the advantage of SII in solving a DBDH problem?
Finally,we have the overall advantage of SI in solving DBDH problem as 1qH1qH2 I.Simulation of SII against Type-II Adversary Setup: SII performs identically to that in SI.
Q9. How long does it take to revocate a key?
To sum up, their revocable scheme achieves both identitybased encryption/decryption and revocability without introducing significant overhead compared to the original IBE scheme [4] (our execution time is still within millisecond).
Q10. What is the key generation and revocation phase of the keyCombine algorithm?
Since the setup, encryption and decryption phases operate exactly as before, the authors will introduce the KeyCombine algorithm and only provide the key generation and revocation for the advanced construction as follows.•
Q11. What is the key update algorithm used to decrypt the email?
When receives the encrypted email, Bob then obtains his private key consisting of an identity component and a time period component from PKG.
Q12. What is the proposed IBE with outsourced revocation scheme?
Then the proposed IBE with outsourced revocation scheme is (t′, ′) secure in the sense of IND-ID-CPA where t′ ≈ t+(qH1 + qH2 + 3qP + 3qU )tEXP and ′ = 1qH1qH2. Proof: Assume that an adversary AI and AII have advantage The authorand II in attacking the proposed IBE scheme in the sense of IND-ID-CPA security for type-I and type-II adversary respectively.