Secure and Efficient Data Sharing Scheme Based on Certificateless Hybrid Signcryption for Cloud Storage

被引:21
|
作者
Luo, Wei [1 ]
Ma, Wenping [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
来源
ELECTRONICS | 2019年 / 8卷 / 05期
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
cloud storage; data encryption; access control; authentication; certificateless hybrid signcryption; PROXY RE-ENCRYPTION; ACCESS-CONTROL; AUTHENTICATION;
D O I
10.3390/electronics8050590
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As cloud service providers are not completely trusted, people are increasingly concerned about security issues such as data confidentiality and user privacy. In many existing schemes, the private key generator (PKG) generates a full private key for each user, which means that the PKG can forge a valid signature or decrypt the ciphertext. To address the issue, we first present a novel certificateless hybrid signcryption (CL-HSC) scheme without pairing, in which the PKG only generates the partial private keys for users. It is provably secure under the Elliptic Curve Computational Diffie-Hellman (EC-CDH) assumption in the random oracle model. Then, we propose a key derivation method by which the data owner only needs to maintain the master key to get rid of the complex key management. By combining our proposed CL-HSC scheme and the key derivation method, we present a secure and efficient data-sharing scheme for cloud storage, which can resist collusion attacks, spoofing attacks, and replay attacks and makes user revocation easier. In addition, compared with some existing schemes, our scheme has a lower computational complexity.
引用
收藏
页数:12
相关论文
共 50 条
  • [21] Certificateless Hybrid Signcryption Scheme for Secure Communication of Wireless Sensor Networks
    Aihan Yin
    Hongchao Liang
    Wireless Personal Communications, 2015, 80 : 1049 - 1062
  • [22] Deep multilayer percepted policy attribute Lamport certificateless signcryption for secure data access and sharing in cloud
    Mala, J.
    Jayanthi, A. N.
    DISTRIBUTED AND PARALLEL DATABASES, 2022, 40 (01) : 67 - 84
  • [23] Deep multilayer percepted policy attribute Lamport certificateless signcryption for secure data access and sharing in cloud
    J. Mala
    A. N. Jayanthi
    Distributed and Parallel Databases, 2022, 40 : 67 - 84
  • [24] An Efficient Certificateless Signcryption Scheme for Secure Communication in UAV Cluster Network
    Da, Lemei
    Wang, Yujue
    Ding, Yong
    Xiong, Wanjun
    Wang, Huiyong
    Liang, Hai
    19TH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS (ISPA/BDCLOUD/SOCIALCOM/SUSTAINCOM 2021), 2021, : 884 - 891
  • [25] Provably secure leakage-resilient certificateless hybrid signcryption scheme
    Zhou Y.-W.
    Yang B.
    Wang Q.-L.
    Yang, Bo (byang@snnu.edu.cn), 2016, Chinese Academy of Sciences (27): : 2898 - 2911
  • [26] An Anonymous Certificateless Signcryption Scheme for Secure and Efficient Deployment of Internet of Vehicles
    Ullah, Insaf
    Khan, Muhammad Asghar
    Alsharif, Mohammed H.
    Nordin, Rosdiadee
    SUSTAINABILITY, 2021, 13 (19)
  • [27] Certificateless Hybrid Signcryption Scheme for Secure Communication of Wireless Sensor Networks
    Yin, Aihan
    Liang, Hongchao
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 80 (03) : 1049 - 1062
  • [28] An Efficient Scheme for Secure Medical Data Sharing in the Cloud
    Jafarian, Iman
    Khorsandi, Siavash
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 15 (03): : 59 - 66
  • [29] An Improved Efficient Certificateless Hybrid Signcryption Scheme for Internet of Things
    Wu, Yong
    Gong, Bei
    Zhang, Yu
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2022, 2022
  • [30] A secure electronic cash based on a certificateless group signcryption scheme
    Mohanty, Sujata
    Majhi, Bansidhar
    Das, Subhalaxmi
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (1-2) : 186 - 195