Secure and Efficient Data Sharing Scheme Based on Certificateless Hybrid Signcryption for Cloud Storage

被引:21
|
作者
Luo, Wei [1 ]
Ma, Wenping [1 ]
机构
[1] Xidian Univ, State Key Lab Integrated Serv Networks, Xian 710071, Shaanxi, Peoples R China
来源
ELECTRONICS | 2019年 / 8卷 / 05期
基金
中国国家自然科学基金; 国家重点研发计划;
关键词
cloud storage; data encryption; access control; authentication; certificateless hybrid signcryption; PROXY RE-ENCRYPTION; ACCESS-CONTROL; AUTHENTICATION;
D O I
10.3390/electronics8050590
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As cloud service providers are not completely trusted, people are increasingly concerned about security issues such as data confidentiality and user privacy. In many existing schemes, the private key generator (PKG) generates a full private key for each user, which means that the PKG can forge a valid signature or decrypt the ciphertext. To address the issue, we first present a novel certificateless hybrid signcryption (CL-HSC) scheme without pairing, in which the PKG only generates the partial private keys for users. It is provably secure under the Elliptic Curve Computational Diffie-Hellman (EC-CDH) assumption in the random oracle model. Then, we propose a key derivation method by which the data owner only needs to maintain the master key to get rid of the complex key management. By combining our proposed CL-HSC scheme and the key derivation method, we present a secure and efficient data-sharing scheme for cloud storage, which can resist collusion attacks, spoofing attacks, and replay attacks and makes user revocation easier. In addition, compared with some existing schemes, our scheme has a lower computational complexity.
引用
收藏
页数:12
相关论文
共 50 条
  • [41] A secure and efficient anonymous certificateless signcryption for Key Distribution Scheme for Smart Grid
    Batamuliza, Jennifer
    Hanyurwimfura, Damien
    2020 21ST INTERNATIONAL ARAB CONFERENCE ON INFORMATION TECHNOLOGY (ACIT), 2020,
  • [42] Elliptic curve-based proxy re-signcryption scheme for secure data storage on the cloud
    Patonico, Simone
    Shabisha, Placide
    Braeken, An
    Touhafi, Abdellah
    Steenhaut, Kris
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2020, 32 (17):
  • [43] Secure Certificateless Signcryption Scheme without Bilinear Pairing
    Zhou Y.-W.
    Yang B.
    Wang Q.-L.
    Ruan Jian Xue Bao/Journal of Software, 2017, 28 (10): : 2757 - 2768
  • [44] Pairing-Free and Secure Certificateless Signcryption Scheme
    Yu, Huifang
    Yang, Bo
    COMPUTER JOURNAL, 2017, 60 (08): : 1187 - 1196
  • [45] Efficient Certificateless Cloud Data Auditing Scheme
    Yang, Haibin
    Li, Ruifeng
    Li, Xiuguang
    Yuan, Wenyong
    Yi, Zhengge
    Yang, Xiaoyuan
    Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2022, 54 (03): : 72 - 79
  • [46] Certificateless threshold signcryption scheme with secret sharing mechanism
    Yu, Huifang
    Wang, Shengbing
    KNOWLEDGE-BASED SYSTEMS, 2021, 221
  • [47] Certificateless public auditing scheme with sensitive information hiding for data sharing in cloud storage
    Ming, Yang
    Zhang, Weixin
    Liu, Hang
    Wang, Chenhao
    JOURNAL OF SYSTEMS ARCHITECTURE, 2023, 143
  • [48] Certificateless Public Verification for Data Storage and Sharing in the Cloud
    HUANG Longxia
    ZHOU Junlong
    ZHANG Gongxuan
    ZHANG Mingyue
    ChineseJournalofElectronics, 2020, 29 (04) : 639 - 647
  • [49] Certificateless Public Verification for Data Storage and Sharing in the Cloud
    Huang, Longxia
    Zhou, Junlong
    Zhang, Gongxuan
    Zhang, Mingyue
    CHINESE JOURNAL OF ELECTRONICS, 2020, 29 (04) : 639 - 647
  • [50] An Efficient Certificateless Anonymous Signcryption Scheme for WBAN
    Long, Weifeng
    Deng, Lunzhi
    Zeng, Jiwen
    Gao, Yan
    Lu, Tianxiu
    SENSORS, 2024, 24 (15)