Advertisement

On the Security of a Cloud-Based Revocable IBPRE Scheme for Data Sharing

  • Jindan Zhang
  • Baocang WangEmail author
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 1)

Abstract

In ESORICS2014, Liang et al. proposed an efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing, aimed at both supporting user revocation and delegation of decryption rights. The main strategy is to let the cloud periodic re-encrypt ciphertexts under the current time period to the next time period. If the user is revoked in the forth coming time period, he cannot decrypt the ciphertexts by using the expired private key anymore. Compared with traditional revocation technique by using PKG, this method has the advantage of computation and communication efficiency. However, in this paper we show an attack which allow the revoked user can decrypt the ciphertexts under the future time period, if the revoked users colludes with the proxy. Although cloud-based revocable identity based proxy re-encryption is a great idea for public cloud storage sharing, it needs further research before this scheme can be practically adapted.

Keywords

Cloud Storage Data Owner Public Cloud Cloud Storage Service Revocation List 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    G. Ateniese, K. Fu, M. Green and S. Hohenberger. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In NDSS(2005), pages 29–43. Google Scholar
  2. 2.
    G. Ateniese, K. Fu, M. Green and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. In ACM Transation Information System Security 9 (2006), no. 1, pages 1–30. Google Scholar
  3. 3.
    M. Blaze, G. Bleumer and M. Strauss. Divertible Protocols and Atomic Proxy Cryptography. In Advances in Cryptology - Eurocrypt’98, LNCS 1403, pp. 127–144. Springer–Verlag, 1998.Google Scholar
  4. 4.
    R. Canetti and S. Hohenberger, Chosen Ciphertext Secure Proxy Re-encryption. In ACM CCS 2007, pp. 185–194.2007.Google Scholar
  5. 5.
    R. Deng, J.Weng, S. Liu and K. Chen. Chosen Ciphertext Secure Proxy Re-encryption without Pairing. In CANS’08, LNCS 5339, pp.1-17, Springer-Verlag, 2008.Google Scholar
  6. 6.
    M. Green and G. Ateniese. Identity-based proxy re-encryption. In ACNS 2007, volume 4521 of LNCS, pages 288–306, 2007.Google Scholar
  7. 7.
    B. Libert and D. Vergnaud. Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. In PKC 2008, LNCS 4939, pages 360–379, Springer–Verlag, 2008.Google Scholar
  8. 8.
    B. Libert and D. Vergnaud. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption. In IEEE Transactions on Information Theory, vol. 57, No. 3, pages 1786–1802, 2011.Google Scholar
  9. 9.
    K. Liang, W. Susilo, J. K. Liu. Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage. In IEEE Transactions on Information Forensics and Security, Vol. 10, No. 8, pages 1578–1589, 2015.Google Scholar
  10. 10.
    K. Liang, M. H. Au, J. K. Liu, W. Susilo, D. S. Wong, G. Yang, T. Phuong, Q. Xie. A DFABased Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. In IEEE Transactions on Information Forensics and Security, Vol. 9, No. 10, pages 1667–1680, 2014.Google Scholar
  11. 11.
    K. Liang, W. Susilo. Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage. In IEEE Transactions on Information Forensics and Security, Vol. 10, No. 9, pages 1981–1992, 2015.Google Scholar
  12. 12.
    J. Shao and Z. Cao. CCA-secure proxy re-encryption without pairing. In PKC 2009, LNCS 5443, pages. 357–376, Springer–Verlag, 2009.Google Scholar
  13. 13.
    J. Shao, Z. Cao, P. Lin. Generic construction for CCA-secure unidirectional proxy reencryption. In Security and Communication Networks, no. 2, pages 1-16, 2009.Google Scholar
  14. 14.
    J. Weng, R. H. Deng, C. Chu, X. Ding, and J. Lai. Conditional proxy re-encryption secure against chosen-ciphertext attack. In ACM ASIACCS 2009, pages 322–332, 2009.Google Scholar
  15. 15.
    J. Weng, Y. Yang, Q. Tang, R. Deng, and F. Bao. Efficient conditional proxy re-encryption with chosen-ciphertext security. In ISC 2009, volume 5735 of LNCS, pages 151–166, 2009.Google Scholar
  16. 16.
    J. Weng, Y. Zhao, G. Hanaoka. On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010. In PKC 2011, pages 284-295, 2011.Google Scholar
  17. 17.
    J. Weng, M. Chen, Y. Yang, R. Deng, K. Chen and F. Bao CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. In Science China Information Sciences, 53, : 593-606, 2010.Google Scholar
  18. 18.
    S. Chow, J. Weng, Y. Yang, R. Deng Efficient unidirectional proxy re-encryption. In AFRICACRYPT 2010, volume 6055 of LNCS, pages 316–332, 2010.Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  1. 1.State Key Laboratory of Integrated Service NetworksXidian UniversityXi’anChina

Personalised recommendations