期刊文献+

Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing 被引量:2

Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing
原文传递
导出
摘要 In current cloud computing system, large amounts of sensitive data are shared to other cloud users.To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencryption(PRE) as the cloud data encryption technique. In a PRE system, a semi-trusted proxy can transform a ciphertext under one public key into a ciphertext of the same message under another public key, but the proxy cannot gain any information about the message. In this paper, we propose a certificateless PRE(CL-PRE) scheme without pairings. The security of the proposed scheme can be proved to be equivalent to the computational DiffieHellman(CDH) problem in the random oracle model. Compared with other existing CL-PRE schemes, our scheme requires less computation cost and is significantly more efficient. The new scheme does not need the public key certificates to guarantee validity of public keys and solves the key escrow problem in identity-based public key cryptography. In current cloud computing system, large amounts of sensitive data are shared to other cloud users. To keep these data confidentiality, data owners should encrypt their data before outsourcing. We choose proxy reencryption (PRE) as the cloud data encryption technique. In a PRE system, a semi-trusted proxy can transform a ciphertext under one public key into a ciphertext of the same message under another public key, but the proxy cannot gain any information about the message. In this paper, we propose a certificateless PRE (CL-PRE) scheme without pairings. The security of the proposed scheme can be proved to be equivalent to the computational Dire- Hellman (CDH) problem in the random oracle model. Compared with other existing CL-PRE schemes, our scheme requires less computation cost and is significantly more efficient. The new scheme does not need the public key certificates to guarantee validity of public keys and solves the key escrow problem in identity-based public key cryptography.
出处 《Journal of Shanghai Jiaotong university(Science)》 EI 2014年第4期398-405,共8页 上海交通大学学报(英文版)
基金 the National Natural Science Foundation of China(No.61133014)
关键词 cloud computing secure data sharing proxy re-encryption(PRE) certificateless encryption key escrow computational Diffie-Hellman(CDH) problem random oracle cloud computing, secure data sharing, proxy re-encryption (PRE), certificateless encryption, key escrow, computational Dife-Hellman (CDH) problem, random oracle
  • 相关文献

参考文献36

  • 1CHOW R, GOLLE P, JAKOBSSON M, et al. Controlling data in the cloud: Outsourcing computation without outsourcing control [C]//Proceedings of the 2009. A CM workshop on cloud computing security. New York, USA: ACM, 2009: 85-90.
  • 2KAMARA S, LAUTER K. Cryptographic cloud storage [C]//Proceedings of the 11^th International Conference on Financial Cryptograpy and Data Security. Berlin, Germany: Springer-Verlag, 2010: 136-149.
  • 3RYAN M D. Cloud computing privacy concerns on our doorstep [J]. Communications of the ACM, 2011, 54(1): 36-38.
  • 4BLAZE M, BLEUMER G, STRAUSS M. Divertible proto- cols and atomic proxy cryptography [J]. Lecture Notes in Computer Science, 1998, 1403: 123-144.
  • 5GOLLE P, JAKOBSSON M, JUELS A, et al. Universal re- encryption for mixnets [J]. Lecture Notes in Computer Science, 2004, 2964: 163-178.
  • 6GREEN M, ATENIESE G. Identity-based proxy re- encryption [C]//Proceedings of the 5th International Conference on Applied Cryptography and Netword Se- curity. Berlin, Germany: Springer-Verlag, 2007: 288- 306.
  • 7CHU C K, TZENG W G. Identity-based proxy re- encryption without random oracles [J]. Lecture Notes in Computer Science, 2007, 4779: 189-202.
  • 8CANETTI P% HOHENBERGER S. Chosen-ciphertext se- cure proxy re-encryption [C]/ / Proeeedings of the lgth ACM Conference on Computer and Communications Security. New York, USA: ACM, 2007: 185-194.
  • 9LIBERT B, VERGNAUD D. Unidirectional chosen- ciphertext secure proxy re-encryption [J]. Lecture Notes in Computer Science, 2008, 4939: 360-379.
  • 10DENG R H, WENG J, LIU S L, et al. Chosen-ciphertext secure proxy re-encryption without pairings [J]. Lec- ture Notes in Computer Science, 2008, 5339: 1-17.

同被引文献10

引证文献2

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部