Public Trace-and-Revoke Proxy Re-Encryption for Secure Data Sharing in Clouds

被引:5
|
作者
Luo, Fucai [1 ]
Wang, Haiyan [2 ]
Susilo, Willy [3 ]
Yan, Xingfu [4 ]
Zheng, Xiaofan [4 ]
机构
[1] Zhejiang Gongshang Univ, Sch Comp Sci & Technol, Hangzhou 310018, Peoples R China
[2] Peng Cheng Lab, Dept New Networks, Shenzhen 518000, Peoples R China
[3] Univ Wollongong, Inst Cybersecur & Cryptol, Sch Comp & Informat Technol, Wollongong, NSW 2522, Australia
[4] South China Normal Univ, Sch Comp Sci, Guangzhou 510631, Peoples R China
基金
中国国家自然科学基金;
关键词
Decoding; Public key; Encryption; Closed box; Transforms; Performance evaluation; Computer security; Cloud computing; data sharing; proxy re-encryption; tracing; trace-and-revoke PRE;
D O I
10.1109/TIFS.2024.3357240
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Proxy re-encryption (PRE), as a promising cryptographic primitive for secure data sharing in clouds, has been widely studied for decades. PRE allows the proxies to use the re-encryption keys to convert ciphertexts computed under the delegator's public key into ones that can be decrypted using the delegatees' secret keys, without knowing anything about the underlying plaintext. This delegable property of decryption rights enables flexible cloud data sharing, but it raises an important issue: if some proxies reveal their re-encryption keys, or collude with some delegatees to create a pirate decoder, then anyone who gains access to the pirate decoder can decrypt all ciphertexts computed under the delegator's public key without the delegator's permission. This paper opens up a potentially new avenue of research to address the above (re-encryption) key abuse problem by proposing the first public trace-and-revoke PRE system, where the malicious delegatees and proxies involved in the generation of a pirate decoder can be identified by anyone who gains access to the pirate decoder, and their decryption capabilities can subsequently be revoked by the content distributor. Our construction is multi-hop, supports user revocation and public (black-box) traceability, and achieves significant efficiency advantages over previous constructions. Technically, our construction is a generic transformation from inner-product functional PRE (IPFPRE) that we introduce to trace-and-revoke PRE. In addition, we instantiate our generic construction of trace-and-revoke PRE from the Learning with Errors (LWE) assumption, which was widely believed to be quantum-resistant. This is achieved by proposing the first LWE-based IPFPRE scheme, which may be of independent interest. Finally, we conduct a comprehensive performance evaluation of our LWE-based trace-and-revoke PRE scheme, and the experimental results show that the proposed LWE-based trace-and-revoke PRE scheme is practical and outperforms current state-of-the-art traceable PRE schemes.
引用
收藏
页码:2919 / 2934
页数:16
相关论文
共 50 条
  • [1] Accountable Proxy Re-Encryption for Secure Data Sharing
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    Lan, Xiao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 145 - 159
  • [2] Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds
    Xu, Peng
    Xu, Jun
    Wang, Wei
    Jin, Hai
    Susilo, Willy
    Zou, Deqing
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 913 - 918
  • [3] Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds
    Chen, Wei-Hao
    Fan, Chun-I
    Tseng, Yi-Fan
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 70 - 73
  • [4] A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds
    Lu, Yang
    Li, Jiguo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 140 - 147
  • [5] Secure Data Sharing in the Cloud Through Proxy Re-Encryption Technique
    Adilakshmi, Jyothi
    Rithika, Badgoian
    Pushpalatha, Chitikela
    Venkatesh, Thurpati
    Lohitha, Mandapati
    2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 700 - 705
  • [6] Efficient Certificate-Based Proxy Re-encryption Scheme for Data Sharing in Public Clouds
    Lu, Yang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2015, 9 (07): : 2703 - 2718
  • [7] Verifiable attribute-based proxy re-encryption for secure public cloud data sharing
    Lin, Suqing
    Zhang, Rui
    Wang, Mingsheng
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1748 - 1758
  • [8] Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things
    Pei, Hongmei
    Yang, Peng
    Li, Weihao
    Du, Miao
    Hu, Zhongjian
    COMPUTER NETWORKS, 2024, 245
  • [9] A Quantum secure sharing protocol for Cloud data based on proxy re-encryption
    Yan Chang
    Shi-Bin Zhang
    Li-Li Yan
    Guo-gen Wan
    Scientific Reports, 10
  • [10] A Quantum secure sharing protocol for Cloud data based on proxy re-encryption
    Chang, Yan
    Zhang, Shi-Bin
    Yan, Li-Li
    Wan, Guo-gen
    SCIENTIFIC REPORTS, 2020, 10 (01)