Secure and Efficient Data Sharing Scheme Based on Certificateless Hybrid Signcryption for Cloud Storage

被引:21
|
作者
Luo, Wei [1 ]
Ma, Wenping [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
来源
ELECTRONICS | 2019年 / 8卷 / 05期
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
cloud storage; data encryption; access control; authentication; certificateless hybrid signcryption; PROXY RE-ENCRYPTION; ACCESS-CONTROL; AUTHENTICATION;
D O I
10.3390/electronics8050590
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As cloud service providers are not completely trusted, people are increasingly concerned about security issues such as data confidentiality and user privacy. In many existing schemes, the private key generator (PKG) generates a full private key for each user, which means that the PKG can forge a valid signature or decrypt the ciphertext. To address the issue, we first present a novel certificateless hybrid signcryption (CL-HSC) scheme without pairing, in which the PKG only generates the partial private keys for users. It is provably secure under the Elliptic Curve Computational Diffie-Hellman (EC-CDH) assumption in the random oracle model. Then, we propose a key derivation method by which the data owner only needs to maintain the master key to get rid of the complex key management. By combining our proposed CL-HSC scheme and the key derivation method, we present a secure and efficient data-sharing scheme for cloud storage, which can resist collusion attacks, spoofing attacks, and replay attacks and makes user revocation easier. In addition, compared with some existing schemes, our scheme has a lower computational complexity.
引用
收藏
页数:12
相关论文
共 50 条
  • [31] Provably Secure Certificateless Ring Signcryption Scheme
    Qi Zhenghua
    Yang Geng
    Ren Xunyi
    CHINA COMMUNICATIONS, 2011, 8 (03) : 99 - 106
  • [32] Secure and Efficient Data Storage and Sharing Scheme Based on Double Blockchain
    Zhang, Lejun
    Peng, Minghui
    Wang, Weizheng
    Su, Yansen
    Cui, Shuna
    Kim, Seokhoon
    CMC-COMPUTERS MATERIALS & CONTINUA, 2021, 66 (01): : 499 - 515
  • [33] An Efficient Biometric Certificateless Signcryption Scheme
    Luo, Ming
    Huang, Donghua
    Hu, Jun
    JOURNAL OF COMPUTERS, 2013, 8 (07) : 1853 - 1860
  • [34] A New Efficient Certificateless Signcryption Scheme
    Wu, Chen-huang
    Chen, Zhi-xiong
    ISISE 2008: INTERNATIONAL SYMPOSIUM ON INFORMATION SCIENCE AND ENGINEERING, VOL 1, 2008, : 661 - 664
  • [35] An Efficient Certificateless Generalized Signcryption Scheme
    Zhang, Bo
    Jia, Zhongtian
    Zhao, Chuan
    SECURITY AND COMMUNICATION NETWORKS, 2018,
  • [36] On security of a Certificateless Hybrid Signcryption Scheme
    Yin, Aihan
    Liang, Hongchao
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (04) : 1727 - 1739
  • [37] On security of a Certificateless Hybrid Signcryption Scheme
    Aihan Yin
    Hongchao Liang
    Wireless Personal Communications, 2015, 85 : 1727 - 1739
  • [38] Hybrid Secure Cloud Storage data based on improved Encryption Scheme
    Deepthi, B.
    Ramani, G.
    Deepika, R.
    Shabbeer, Md
    2021 INTERNATIONAL CONFERENCE ON EMERGING SMART COMPUTING AND INFORMATICS (ESCI), 2021, : 776 - 779
  • [39] Secure Big Data Storage and Sharing Scheme for Cloud Tenants
    CHENG Hongbing
    RONG Chunming
    HWANG Kai
    WANG Weihong
    LI Yanyan
    中国通信, 2015, 12 (06) : 106 - 115
  • [40] Secure Big Data Storage and Sharing Scheme for Cloud Tenants
    Cheng Hongbing
    Rong Chunming
    Hwang Kai
    Wang Weihong
    Li Yanyan
    CHINA COMMUNICATIONS, 2015, 12 (06) : 106 - 115