Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme
Seunghwan Park,Dong Hoon Lee +1 more
Reads0
Chats0
TLDR
It is shown that the CR-IB-PRE scheme with the reduced key update token size is not secure against collusion attacks.Abstract:
Designing secure revocable storage systems for a large number of users in a cloud-based environment is important. Cloud storage systems should allow its users to dynamically join and leave the storage service. Further, the rights of the users to access the data should be changed accordingly. Recently, Liang et al. proposed a cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation and delegation of decryption rights. Moreover, to reduce the size of the key update token, they employed a public key broadcast encryption system as a building block. In this paper, we show that the CR-IB-PRE scheme with the reduced key update token size is not secure against collusion attacks. key words: revocable identity-based encryption, key revocation, cloudbased identity-based proxy re-encryption, ciphertext updateread more
Citations
More filters
Posted Content
An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing
TL;DR: In this article, the authors proposed a cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation but also delegation of decryption rights.
Journal ArticleDOI
IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability
TL;DR: A new primitive IB-VPRE is proposed by extending the basic IB-PRE scheme with a new functionality called re-encryption verifiability, meaning that a re-encrypted ciphertext receiver or a third party can verify whether the received ciphertext is correctly transformed from an original ciphertext or not, and thus can detect illegal activities of the proxy.
References
More filters
Book ChapterDOI
Identity-Based Encryption from the Weil Pairing
Dan Boneh,Matthew K. Franklin +1 more
TL;DR: This work proposes a fully functional identity-based encryption scheme (IBE) based on the Weil pairing that has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem.
Book ChapterDOI
Revocation and Tracing Schemes for Stateless Receivers
TL;DR: In this paper, the Subset-Cover framework is proposed for the stateless receiver case, where the users do not (necessarily) update their state from session to session, and sufficient conditions that guarantee the security of a revocation algorithm in this class are provided.
Proceedings ArticleDOI
Identity-based encryption with efficient revocation
TL;DR: This work proposes an IBE scheme that significantly improves key-update efficiency on the side of the trusted party (from linear to logarithmic in the number of users), while staying efficient for the users.
Book ChapterDOI
Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption
TL;DR: A scheme allows a storage server to update stored ciphertexts to disqualify revoked users from accessing data that was encrypted before the user's access was revoked while key update broadcasts can dynamically revoke selected users.
Book ChapterDOI
Revocable Identity-Based Encryption Revisited: Security Model and Construction
Jae Hong Seo,Keita Emura +1 more
TL;DR: In this article, the authors revisited the Boldyreva et al. security model, and proposed a scalable RIBE scheme with decryption key exposure resistance, which is more efficient than previous (adaptively secure) scalable IBE schemes.
Related Papers (5)
Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
Revocable-storage identity-based encryption in cloud computing for secure data sharing
V.Lasya Reddy,V. Sellam +1 more