Search Paper
  • Home
  • Login
  • Categories
  • Post URL
  • Academic Resources
  • Contact Us

 

Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing

google+
Views: 127                 

Author :  Xu An Wang , Xiaoyuan Yang , Cong Li , Yudong Liu , and Yong Ding

Affiliation :  Engineering University of Chinese Armed Police Force, P. R. China

Country :  China

Category :  Computer Science & Information Technology

Volume, Issue, Month, Year :  15, 3, October, 2018

Abstract :


Recently Liang et al. propose an interesting privacy-preserving ciphertext multi-sharing control for big data storage mechanism, which is based on the cryptographic primitive of anonymous multi-hop identity based conditional proxy re-encryption scheme AMH-IBCPRE. They propose a concrete AMH-IBCPRE scheme and conclude their scheme can achieve IND-sCon-sID-CCA secure (indistinguishable secure under selectively conditional selectively identity chosen ciphertext attack). However, our research show their scheme can not be IND-sConsID-CCA secure for single-hop and multi-hop data sharing. Also in 2014, Liang et al. propose an interesting deterministic finite automata-based functional proxy reencryption scheme DFA-based FPRE for secure public cloud data sharing, they also conclude their scheme can achieve IND-CCA secure (indistinguishable secure under chosen ciphertext attack), we also show their scheme can not be IND-CCA secure either. For these two proposals, the main reason of insecurity is that part of the re-encryption key has the same structure as the valid ciphertext, thus the adversary can query on the decryption oracle with this part of the re-encryption key to get secret keys, which will break the CCA-security of their scheme. We give an improved AMH-IBCPRE scheme and an improved DFA-based FPRE scheme for cloud data sharing and show the new schemes can resist our attack and be CCA-secure. We also demonstrate our improved AMH-IBCPRE scheme’s efficiency compared with other related identity based proxy re-encryption schemes, the results show our scheme is almost the most efficient one

Keyword :  Attack, multi-control for big data storage, secure cloud data sharing, proxy re-encryption, chosen ciphertext security.

Journal/ Proceedings Name :  Computer Science and Information Systems

URL :  http://www.doiserbia.nb.rs/img/doi/1820-0214/2018/1820-02141800024W.pdf

User Name : alex
Posted 14-02-2020 on 15:13:02 AEDT



Related Research Work

  • An Adaptive And Smart System For Parental Control On Digital Games
  • Intelligent System For Solving Problems Of Veterinary Medicine On The Example Of Dairy Farms
  • A Diet Control And Fitness Assistant Application Using Deep Learning-based Image Classification
  • 2d Image Features Detector And Descriptor Selection Expert System

About Us | Post Cfp | Share URL Main | Share URL category | Post URL
All Rights Reserved @ Call for Papers - Conference & Journals