Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud

被引:0
|
作者
Yan, Xixi [1 ]
Zhang, Jing [2 ]
Cheng, Pengyu [2 ]
机构
[1] Henan Polytech Univ, Sch Software, Henan Key Lab Network Cryptog Technol, Network Informat Secur & Cryptog Lab, Jiaozuo 454003, Peoples R China
[2] Henan Polytech Univ, Sch Comp Sci & Technol, Jiaozuo 454000, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2025年 / 83卷 / 01期
关键词
Cloud service; conditional proxy re-encryption; user revocation; weighted attribute; CIPHERTEXT EVOLUTION; SCHEME;
D O I
10.32604/cmc.2025.059969
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conditional proxy re-encryption (CPRE) is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular, but most of the attribute-based conditional proxy re-encryption (AB-CPRE) schemes proposed so far do not take into account the importance of user attributes. A weighted attribute-based conditional proxy re-encryption (WAB-CPRE) scheme is thus designed to provide more precise decryption rights delegation. By introducing the concept of weight attributes, the quantity of system attributes managed by the server is reduced greatly. At the same time, a weighted tree structure is constructed to simplify the expression of access structure effectively. With conditional proxy re-encryption, large amounts of data and complex computations are outsourced to cloud servers, so the data owner (DO) can revoke the user's decryption rights directly with minimal costs. The scheme proposed achieves security against chosen plaintext attacks (CPA). Experimental simulation results demonstrated that the decryption time is within 6-9 ms, and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes, which enables users to access cloud data on devices with limited resources.
引用
收藏
页码:1399 / 1414
页数:16
相关论文
共 50 条
  • [21] Attribute-based Proxy Re-encryption Method for Revocation in Cloud Data Storage
    Yasumura, Yoshiko
    Imabayashi, Hiroki
    Yamana, Hayato
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4858 - 4860
  • [22] A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud
    Chen, Zhanwen
    Chen, Jiageng
    Meng, Weizhi
    2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, : 569 - 576
  • [23] Attribute-Based Proxy Re-Encryption with Keyword Search
    Shi, Yanfeng
    Liu, Jiqiang
    Han, Zhen
    Zheng, Qingji
    Zhang, Rui
    Qiu, Shuo
    PLOS ONE, 2014, 9 (12):
  • [24] Attribute-Based Proxy Re-Encryption with Dynamic Membership
    Fan, Chun-I
    Wu, Chien-Nan
    Chen, Chun-Hung
    Tseng, Yi-Fan
    Feng, Cheng-Chun
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 26 - 32
  • [25] Ciphertext Policy Attribute-Based Proxy Re-encryption
    Luo, Song
    Hu, Jianbin
    Chen, Zhong
    INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 401 - +
  • [26] Lattice-based Fuzzy Conditional Proxy Re-encryption
    Li, BaoHong
    Xu, JieFei
    Liu, YanZhi
    JOURNAL OF INTERNET TECHNOLOGY, 2019, 20 (05): : 1379 - 1385
  • [27] Verifiable attribute-based proxy re-encryption for secure public cloud data sharing
    Lin, Suqing
    Zhang, Rui
    Wang, Mingsheng
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1748 - 1758
  • [28] A Searchable Hierarchical Conditional Proxy Re-Encryption Scheme for Cloud Storage Services
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Chin-Ling
    Chiu, Shih-Ting
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (03): : 289 - 299
  • [29] An Authenticated Keyword Searchable Conditional Proxy Re-encryption Scheme in Cloud Services
    Sharma, Sumit
    Swarnakar, Ashutosh
    Babu, Ch Jayanth
    Padmavathy, R.
    Kumar, Rakesh
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [30] A new outsourcing conditional proxy re-encryption suitable for mobile cloud environment
    Son, Junggab
    Kim, Donghyun
    Bhuiyan, Md Zakirul Alam
    Hussain, Rasheed
    Oh, Heekuck
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2017, 29 (14):