scispace - formally typeset
Open AccessJournal ArticleDOI

Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme

Seunghwan Park, +1 more
- 01 Jul 2016 - 
- Vol. 99, Iss: 7, pp 1933-1936
Reads0
Chats0
TLDR
It is shown that the CR-IB-PRE scheme with the reduced key update token size is not secure against collusion attacks.
Abstract
Designing secure revocable storage systems for a large number of users in a cloud-based environment is important. Cloud storage systems should allow its users to dynamically join and leave the storage service. Further, the rights of the users to access the data should be changed accordingly. Recently, Liang et al. proposed a cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation and delegation of decryption rights. Moreover, to reduce the size of the key update token, they employed a public key broadcast encryption system as a building block. In this paper, we show that the CR-IB-PRE scheme with the reduced key update token size is not secure against collusion attacks. key words: revocable identity-based encryption, key revocation, cloudbased identity-based proxy re-encryption, ciphertext update

read more

Content maybe subject to copyright    Report

Citations
More filters
Posted Content

An Efficient Cloud-based Revocable Identity-based Proxy Re-encryption Scheme for Public Clouds Data Sharing

TL;DR: In this article, the authors proposed a cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation but also delegation of decryption rights.
Journal ArticleDOI

IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability

TL;DR: A new primitive IB-VPRE is proposed by extending the basic IB-PRE scheme with a new functionality called re-encryption verifiability, meaning that a re-encrypted ciphertext receiver or a third party can verify whether the received ciphertext is correctly transformed from an original ciphertext or not, and thus can detect illegal activities of the proxy.
References
More filters
Book ChapterDOI

Identity-Based Encryption from the Weil Pairing

TL;DR: This work proposes a fully functional identity-based encryption scheme (IBE) based on the Weil pairing that has chosen ciphertext security in the random oracle model assuming an elliptic curve variant of the computational Diffie-Hellman problem.
Book ChapterDOI

Revocation and Tracing Schemes for Stateless Receivers

TL;DR: In this paper, the Subset-Cover framework is proposed for the stateless receiver case, where the users do not (necessarily) update their state from session to session, and sufficient conditions that guarantee the security of a revocation algorithm in this class are provided.
Proceedings ArticleDOI

Identity-based encryption with efficient revocation

TL;DR: This work proposes an IBE scheme that significantly improves key-update efficiency on the side of the trusted party (from linear to logarithmic in the number of users), while staying efficient for the users.
Book ChapterDOI

Dynamic Credentials and Ciphertext Delegation for Attribute-Based Encryption

TL;DR: A scheme allows a storage server to update stored ciphertexts to disqualify revoked users from accessing data that was encrypted before the user's access was revoked while key update broadcasts can dynamically revoke selected users.
Book ChapterDOI

Revocable Identity-Based Encryption Revisited: Security Model and Construction

TL;DR: In this article, the authors revisited the Boldyreva et al. security model, and proposed a scalable RIBE scheme with decryption key exposure resistance, which is more efficient than previous (adaptively secure) scalable IBE schemes.
Related Papers (5)