Abstract
In cloud platforms, nowadays more and more data owners prefer to first encrypt their personal files and then outsource them to the cloud storage. This however, poses several challenges such as those related to access control and rights. Most previous research results care more about the fine-grained access to the encrypted private files, while little research has concentrated on the following basic question: have the stored ciphertexts been successfully decrypted and when did this happen? Aiming at tackling this problem, we propose a new notion of encryption, namely, public key encryption with decryption awareness ability, which we denote as PKE-DAA. Concretely speaking, PKE-DAA can realize the following: after a ciphertext has been created by the encrypter, once this ciphertext has been successfully decrypted, the encrypter or some other party could be aware of the decryption! To the best of our knowledge, until now there are no such notions or encryption schemes. Own to the recent cryptographic community research result on obfuscation, especially indistinguishable obfuscation, we try to give such a construction in a weak form.We believe that this new primitive has many potential applications, such as against strongest illegal eavesdropping launched by NSA in the post-Snowden era etc.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Barak B, Goldreich O, Impagliazzo R, Rudich S, Sahai A, Vadhan SP, Yang K (2001) On the (im)possibility of obfuscating programs. In: Kilian J (ed) CRYPTO 2001, Springer, Berlin, Germany, Santa Barbara, CA, USA, LNCS, vol 2139, pp 1–18
Boneh D, Franklin MK (2001) Identity-based encryption from the Weil pairing. In: Kilian J (ed) CRYPTO 2001, Springer, Berlin, Germany, Santa Barbara, CA, USA, LNCS, vol 2139, pp 213–229
Boneh D, ZhandryM(2014) Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation. In: Garay JA, Gennaro R (eds) CRYPTO 2014, Part I, Springer, Berlin, Germany, Santa Barbara, CA, USA, LNCS, vol 8616, pp 480–499, DOI 10.1007/978-3-662-44371-2_27
Brakerski Z, Vaikuntanathan V (2011) Efficient fully homomorphic encryption from (standard) LWE. In: Ostrovsky R (ed) 52nd FOCS, IEEE Computer Society Press, Palm Springs, California, USA, pp 97–106
Brakerski Z, Gentry C, Vaikuntanathan V (2012) (leveled) fully homomorphic encryption without bootstrapping. Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, pages 309–325
Chase M, Chow SSM (2009) Improving privacy and security in multi-authority attribute-based encryption. In: Al-Shaer E, Jha S, Keromytis AD (eds) ACM CCS 09, ACM Press, Chicago, Illinois, USA, pp 121–130
Diffie W, Hellman ME (1976) New directions in cryptography. IEEE Transactions on Information Theory 22(6):644–654
Garg S, Gentry C, Halevi S, Raykova M, Sahai A, Waters B (2013) Candidate indistinguishability obfuscation and functional encryption for all circuits. In: 54th FOCS, IEEE Computer Society Press, Berkeley, CA, USA, pp 40–49
Garg S, Gentry C, Halevi S, Sahai A, Waters B (2013) Attribute-based encryption for circuits from multilinear maps. In: Canetti R, Garay JA (eds) CRYPTO 2013, Part II, Springer, Berlin, Germany, Santa Barbara, CA, USA, LNCS, vol 8043, pp 479–499, DOI 10.1007/978-3-642-40084-1_27
Gentry C, Halevi S, Smart NP (2012) Fully homomorphic encryption with polylog overhead. In: Pointcheval D, Johansson T (eds) EUROCRYPT 2012, Springer, Berlin, Germany, Cambridge, UK, LNCS, vol 7237, pp 465–482
Gentry C, Sahai A, Waters B (2013) Homomorphic encryption from learning with errors: Conceptually-simpler, asymptotically-faster, attribute-based. In: Canetti R, Garay JA (eds) CRYPTO 2013, Part I, Springer, Berlin, Germany, Santa Barbara, CA, USA, LNCS, vol 8042, pp 75–92, DOI 10.1007/978-3-642-40041-4_5
Goldwasser S, Kalai YT (2005) On the impossibility of obfuscation with auxiliary input. In: 46th FOCS, IEEE Computer Society Press, Pittsburgh, PA, USA, pp 553–562
Goldwasser S, Rothblum GN (2007) On best-possible obfuscation. In: Vadhan SP (ed) TCC 2007, Springer, Berlin, Germany, Amsterdam, The Netherlands, LNCS, vol 4392, pp 194–213
Gorbunov S, Vaikuntanathan V, Wee H (2013) Attribute-based encryption for circuits. In: Boneh D, Roughgarden T, Feigenbaum J (eds) 45th ACM STOC, ACM Press, Palo Alto, CA, USA, pp 545–554
Goyal V, Pandey O, Sahai A, Waters B (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Juels A, Wright RN, Vimercati S (eds) ACM CCS 06, ACM Press, Alexandria, Virginia, USA, pp 89–98, available as Cryptology ePrint Archive Report 2006/309
Hada S (2000) Zero-knowledge and code obfuscation. In: Okamoto T (ed) ASIACRYPT 2000, Springer, Berlin, Germany, Kyoto, Japan, LNCS, vol 1976, pp 443–457
Halevi S, Shoup V (2014) Algorithms in HElib. Cryptology ePrint Archive, Report 2014/106, http://eprint.iacr.org/2014/106
Lewko AB,Waters B (2011) Decentralizing attribute-based encryption. In: Paterson KG (ed) EUROCRYPT 2011, Springer, Berlin, Germany, Tallinn, Estonia, LNCS, vol 6632, pp 568–588
Lewko AB, Waters B (2012) New proof methods for attribute-based encryption: Achieving full security through selective techniques. In: Safavi-Naini R, Canetti R (eds) CRYPTO 2012, Springer, Berlin, Germany, Santa Barbara, CA, USA, LNCS, vol 7417, pp 180–198
Lewko AB, Okamoto T, Sahai A, Takashima K, Waters B (2010) Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption. In: Gilbert H (ed) EUROCRYPT 2010, Springer, Berlin, Germany, French Riviera, LNCS, vol 6110, pp 62–91
Okamoto T, Takashima K (2010) Fully secure functional encryption with general relations from the decisional linear assumption. In: Rabin T (ed) CRYPTO 2010, Springer, Berlin, Germany, Santa Barbara, CA, USA, LNCS, vol 6223, pp 191–208
Rivest RL, Shamir A, Adleman LM (1978) A method for obtaining digital signature and public-key cryptosystems. Communications of the Association for Computing Machinery 21(2):120–126
Sahai A, Waters B (2014) How to use indistinguishability obfuscation: deniable encryption, and more. In: Shmoys DB (ed) 46th ACMSTOC, ACMPress, New York, NY, USA, pp 475–484
Sahai A,Waters BR (2005) Fuzzy identity-based encryption. In: Cramer R (ed) EUROCRYPT 2005, Springer, Berlin, Germany, Aarhus, Denmark, LNCS, vol 3494, pp 457–473
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Wang, X.A., Xhafa, F., Wu, G., Wang, W. (2017). Toward Construction of Encryption with Decryption Awareness Ability for Cloud Storage. In: Xhafa, F., Barolli, L., Amato, F. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 1. Springer, Cham. https://doi.org/10.1007/978-3-319-49109-7_27
Download citation
DOI: https://doi.org/10.1007/978-3-319-49109-7_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49108-0
Online ISBN: 978-3-319-49109-7
eBook Packages: EngineeringEngineering (R0)