Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing
Computer Science and Information Systems, Tome 15 (2018) no. 3.

Voir la notice de l'article provenant de la source Computer Science and Information Systems website

Recently Liang et al. propose an interesting privacy-preserving ciphertext multi-sharing control for big data storage mechanism, which is based on the cryptographic primitive of anonymous multi-hop identity based conditional proxy re-encryption scheme AMH-IBCPRE. They propose a concrete AMH-IBCPRE scheme and conclude their scheme can achieve IND-sCon-sID-CCA secure (indistinguishable secure under selectively conditional selectively identity chosen ciphertext attack). However, our research show their scheme can not be IND-sConsID-CCA secure for single-hop and multi-hop data sharing. Also in 2014, Liang et al. propose an interesting deterministic finite automata-based functional proxy reencryption scheme DFA-based FPRE for secure public cloud data sharing, they also conclude their scheme can achieve IND-CCA secure (indistinguishable secure under chosen ciphertext attack), we also show their scheme can not be IND-CCA secure either. For these two proposals, the main reason of insecurity is that part of the re-encryption key has the same structure as the valid ciphertext, thus the adversary can query on the decryption oracle with this part of the re-encryption key to get secret keys, which will break the CCA-security of their scheme.We give an improved AMH-IBCPRE scheme and an improved DFA-based FPRE scheme for cloud data sharing and show the new schemes can resist our attack and be CCA-secure.We also demonstrate our improved AMH-IBCPRE scheme’s efficiency compared with other related identity based proxy re-encryption schemes, the results show our scheme is almost the most efficient one.
Keywords: Attack, multi-control for big data storage, secure cloud data sharing, proxy re-encryption, chosen ciphertext security
@article{CSIS_2018_15_3_a9,
     author = {Xu An Wang and Xiaoyuan Yang and Cong Li and Yudong Liu and Yong Ding},
     title = {Improved {Functional} {Proxy} {Re-encryption} {Schemes} for {Secure} {Cloud} {Data} {Sharing}},
     journal = {Computer Science and Information Systems},
     publisher = {mathdoc},
     volume = {15},
     number = {3},
     year = {2018},
     url = {http://geodesic.mathdoc.fr/item/CSIS_2018_15_3_a9/}
}
TY  - JOUR
AU  - Xu An Wang
AU  - Xiaoyuan Yang
AU  - Cong Li
AU  - Yudong Liu
AU  - Yong Ding
TI  - Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing
JO  - Computer Science and Information Systems
PY  - 2018
VL  - 15
IS  - 3
PB  - mathdoc
UR  - http://geodesic.mathdoc.fr/item/CSIS_2018_15_3_a9/
ID  - CSIS_2018_15_3_a9
ER  - 
%0 Journal Article
%A Xu An Wang
%A Xiaoyuan Yang
%A Cong Li
%A Yudong Liu
%A Yong Ding
%T Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing
%J Computer Science and Information Systems
%D 2018
%V 15
%N 3
%I mathdoc
%U http://geodesic.mathdoc.fr/item/CSIS_2018_15_3_a9/
%F CSIS_2018_15_3_a9
Xu An Wang; Xiaoyuan Yang; Cong Li; Yudong Liu; Yong Ding. Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing. Computer Science and Information Systems, Tome 15 (2018) no. 3. http://geodesic.mathdoc.fr/item/CSIS_2018_15_3_a9/