Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing
Computer Science and Information Systems, Tome 15 (2018) no. 3
Cet article a éte moissonné depuis la source Computer Science and Information Systems website
Recently Liang et al. propose an interesting privacy-preserving ciphertext multi-sharing control for big data storage mechanism, which is based on the cryptographic primitive of anonymous multi-hop identity based conditional proxy re-encryption scheme AMH-IBCPRE. They propose a concrete AMH-IBCPRE scheme and conclude their scheme can achieve IND-sCon-sID-CCA secure (indistinguishable secure under selectively conditional selectively identity chosen ciphertext attack). However, our research show their scheme can not be IND-sConsID-CCA secure for single-hop and multi-hop data sharing. Also in 2014, Liang et al. propose an interesting deterministic finite automata-based functional proxy reencryption scheme DFA-based FPRE for secure public cloud data sharing, they also conclude their scheme can achieve IND-CCA secure (indistinguishable secure under chosen ciphertext attack), we also show their scheme can not be IND-CCA secure either. For these two proposals, the main reason of insecurity is that part of the re-encryption key has the same structure as the valid ciphertext, thus the adversary can query on the decryption oracle with this part of the re-encryption key to get secret keys, which will break the CCA-security of their scheme.We give an improved AMH-IBCPRE scheme and an improved DFA-based FPRE scheme for cloud data sharing and show the new schemes can resist our attack and be CCA-secure.We also demonstrate our improved AMH-IBCPRE scheme’s efficiency compared with other related identity based proxy re-encryption schemes, the results show our scheme is almost the most efficient one.
Keywords:
Attack, multi-control for big data storage, secure cloud data sharing, proxy re-encryption, chosen ciphertext security
@article{CSIS_2018_15_3_a9,
author = {Xu An Wang and Xiaoyuan Yang and Cong Li and Yudong Liu and Yong Ding},
title = {Improved {Functional} {Proxy} {Re-encryption} {Schemes} for {Secure} {Cloud} {Data} {Sharing}},
journal = {Computer Science and Information Systems},
year = {2018},
volume = {15},
number = {3},
url = {http://geodesic.mathdoc.fr/item/CSIS_2018_15_3_a9/}
}
TY - JOUR AU - Xu An Wang AU - Xiaoyuan Yang AU - Cong Li AU - Yudong Liu AU - Yong Ding TI - Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing JO - Computer Science and Information Systems PY - 2018 VL - 15 IS - 3 UR - http://geodesic.mathdoc.fr/item/CSIS_2018_15_3_a9/ ID - CSIS_2018_15_3_a9 ER -
%0 Journal Article %A Xu An Wang %A Xiaoyuan Yang %A Cong Li %A Yudong Liu %A Yong Ding %T Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing %J Computer Science and Information Systems %D 2018 %V 15 %N 3 %U http://geodesic.mathdoc.fr/item/CSIS_2018_15_3_a9/ %F CSIS_2018_15_3_a9
Xu An Wang; Xiaoyuan Yang; Cong Li; Yudong Liu; Yong Ding. Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing. Computer Science and Information Systems, Tome 15 (2018) no. 3. http://geodesic.mathdoc.fr/item/CSIS_2018_15_3_a9/