Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud

被引:0
|
作者
Yan, Xixi [1 ]
Zhang, Jing [2 ]
Cheng, Pengyu [2 ]
机构
[1] Henan Polytech Univ, Sch Software, Henan Key Lab Network Cryptog Technol, Network Informat Secur & Cryptog Lab, Jiaozuo 454003, Peoples R China
[2] Henan Polytech Univ, Sch Comp Sci & Technol, Jiaozuo 454000, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2025年 / 83卷 / 01期
关键词
Cloud service; conditional proxy re-encryption; user revocation; weighted attribute; CIPHERTEXT EVOLUTION; SCHEME;
D O I
10.32604/cmc.2025.059969
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conditional proxy re-encryption (CPRE) is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular, but most of the attribute-based conditional proxy re-encryption (AB-CPRE) schemes proposed so far do not take into account the importance of user attributes. A weighted attribute-based conditional proxy re-encryption (WAB-CPRE) scheme is thus designed to provide more precise decryption rights delegation. By introducing the concept of weight attributes, the quantity of system attributes managed by the server is reduced greatly. At the same time, a weighted tree structure is constructed to simplify the expression of access structure effectively. With conditional proxy re-encryption, large amounts of data and complex computations are outsourced to cloud servers, so the data owner (DO) can revoke the user's decryption rights directly with minimal costs. The scheme proposed achieves security against chosen plaintext attacks (CPA). Experimental simulation results demonstrated that the decryption time is within 6-9 ms, and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes, which enables users to access cloud data on devices with limited resources.
引用
收藏
页码:1399 / 1414
页数:16
相关论文
共 50 条
  • [41] Multi-use Conditional Proxy Re-encryption
    Mo, Lequn
    Yao, Guoxiang
    PROCEEDINGS OF 2013 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CLOUD COMPUTING COMPANION (ISCC-C), 2014, : 246 - 251
  • [42] Conditional Proxy Re-Encryption - A More Efficient Construction
    Vivek, S. Sree
    Selvi, S. Sharmila Deva
    Radhakishan, V.
    Rangan, C. Pandu
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 502 - +
  • [43] Provably Secure Certificate-based Conditional Proxy Re-encryption
    Li, Jiguo
    Zhao, Xuexia
    Zhang, Yichen
    Yao, Wei
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (04) : 813 - 830
  • [44] Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption
    Kawai, Yutaka
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 301 - 315
  • [45] Conditional proxy broadcast re-encryption with fine grain policy for cloud data sharing
    Sun, Maosheng
    Ge, Chunpeng
    Fang, Liming
    Wang, Jiandong
    INTERNATIONAL JOURNAL OF EMBEDDED SYSTEMS, 2019, 11 (02) : 115 - 124
  • [46] A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme
    Feng, Tao
    Wang, Dewei
    Gong, Renbin
    INFORMATION, 2023, 14 (05)
  • [47] Conditional Proxy Re-Encryption for Secure Big Data Group Sharing in Cloud Environment
    Son, Junggab
    Kim, Donghyun
    Hussain, Rasheed
    Oh, Heekuck
    2014 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2014, : 541 - 546
  • [48] Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage
    Jiang, Linmei
    Guo, Donghui
    IEEE ACCESS, 2017, 5 : 13336 - 13345
  • [49] Efficient and HRA Secure Universal Conditional Proxy Re-Encryption for Cloud-Based Data Sharing
    Hu, Huidan
    Zhou, Yuanjian
    Cao, Zhenfu
    Dong, Xiaolei
    APPLIED SCIENCES-BASEL, 2022, 12 (19):
  • [50] Proxy Re-encryption with Unforgeable Re-encryption Keys
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 20 - 33