An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing
Liang, Kaitai, Liu, Joseph K., Wong, Duncan S. and Susilo, Willy (2014) An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing In: 19th European Symposium on Research in Computer Security- ESORICS 2014, 7-11 Sept 2014., Wroclaw, Poland.
Full text not available from this repository.Abstract
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification process. However, revocation remains as a daunting task in terms of ciphertext update and key update phases. In this paper, we provide an affirmative solution to solve the efficiency problem incurred by revocation. We propose the first cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation but also delegation of decryption rights. No matter a user is revoked or not, at the end of a given time period the cloud acting as a proxy will re-encrypt all ciphertexts of the user under the current time period to the next time period. If the user is revoked in the forthcoming time period, he cannot decrypt the ciphertexts by using the expired private key anymore. Comparing to some naive solutions which require a private key generator (PKG) to interact with non-revoked users in each time period, the new scheme provides definite advantages in terms of communication and computation efficiency.
Item Type: | Conference or Workshop Item (Conference Paper) | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Divisions : | Faculty of Engineering and Physical Sciences > Computer Science | |||||||||||||||
Authors : |
|
|||||||||||||||
Date : | September 2014 | |||||||||||||||
DOI : | 10.1007/978-3-319-11203-9_15 | |||||||||||||||
Copyright Disclaimer : | © Springer International Publishing Switzerland 2014 | |||||||||||||||
Uncontrolled Keywords : | Revocable identity-based encryption cloud-based revocable identity-based proxy re-encryption standard model | |||||||||||||||
Additional Information : | Part of the Lecture Notes in Computer Science book series | |||||||||||||||
Depositing User : | Karen Garland | |||||||||||||||
Date Deposited : | 22 Nov 2017 13:36 | |||||||||||||||
Last Modified : | 06 Jul 2019 05:24 | |||||||||||||||
URI: | http://epubs.surrey.ac.uk/id/eprint/844919 |
Actions (login required)
![]() |
View Item |
Downloads
Downloads per month over past year