Abstract
In ESORICS2014, Liang et al. proposed an efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing, aimed at both supporting user revocation and delegation of decryption rights. The main strategy is to let the cloud periodic re-encrypt ciphertexts under the current time period to the next time period. If the user is revoked in the forth coming time period, he cannot decrypt the ciphertexts by using the expired private key anymore. Compared with traditional revocation technique by using PKG, this method has the advantage of computation and communication efficiency. However, in this paper we show an attack which allow the revoked user can decrypt the ciphertexts under the future time period, if the revoked users colludes with the proxy. Although cloud-based revocable identity based proxy re-encryption is a great idea for public cloud storage sharing, it needs further research before this scheme can be practically adapted.
Access provided by CONRICYT-eBooks. Download to read the full chapter text
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
G. Ateniese, K. Fu, M. Green and S. Hohenberger. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In NDSS(2005), pages 29–43.
G. Ateniese, K. Fu, M. Green and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. In ACM Transation Information System Security 9 (2006), no. 1, pages 1–30.
M. Blaze, G. Bleumer and M. Strauss. Divertible Protocols and Atomic Proxy Cryptography. In Advances in Cryptology - Eurocrypt’98, LNCS 1403, pp. 127–144. Springer–Verlag, 1998.
R. Canetti and S. Hohenberger, Chosen Ciphertext Secure Proxy Re-encryption. In ACM CCS 2007, pp. 185–194.2007.
R. Deng, J.Weng, S. Liu and K. Chen. Chosen Ciphertext Secure Proxy Re-encryption without Pairing. In CANS’08, LNCS 5339, pp.1-17, Springer-Verlag, 2008.
M. Green and G. Ateniese. Identity-based proxy re-encryption. In ACNS 2007, volume 4521 of LNCS, pages 288–306, 2007.
B. Libert and D. Vergnaud. Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. In PKC 2008, LNCS 4939, pages 360–379, Springer–Verlag, 2008.
B. Libert and D. Vergnaud. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption. In IEEE Transactions on Information Theory, vol. 57, No. 3, pages 1786–1802, 2011.
K. Liang, W. Susilo, J. K. Liu. Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage. In IEEE Transactions on Information Forensics and Security, Vol. 10, No. 8, pages 1578–1589, 2015.
K. Liang, M. H. Au, J. K. Liu, W. Susilo, D. S. Wong, G. Yang, T. Phuong, Q. Xie. A DFABased Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. In IEEE Transactions on Information Forensics and Security, Vol. 9, No. 10, pages 1667–1680, 2014.
K. Liang, W. Susilo. Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage. In IEEE Transactions on Information Forensics and Security, Vol. 10, No. 9, pages 1981–1992, 2015.
J. Shao and Z. Cao. CCA-secure proxy re-encryption without pairing. In PKC 2009, LNCS 5443, pages. 357–376, Springer–Verlag, 2009.
J. Shao, Z. Cao, P. Lin. Generic construction for CCA-secure unidirectional proxy reencryption. In Security and Communication Networks, no. 2, pages 1-16, 2009.
J. Weng, R. H. Deng, C. Chu, X. Ding, and J. Lai. Conditional proxy re-encryption secure against chosen-ciphertext attack. In ACM ASIACCS 2009, pages 322–332, 2009.
J. Weng, Y. Yang, Q. Tang, R. Deng, and F. Bao. Efficient conditional proxy re-encryption with chosen-ciphertext security. In ISC 2009, volume 5735 of LNCS, pages 151–166, 2009.
J. Weng, Y. Zhao, G. Hanaoka. On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010. In PKC 2011, pages 284-295, 2011.
J. Weng, M. Chen, Y. Yang, R. Deng, K. Chen and F. Bao CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. In Science China Information Sciences, 53, : 593-606, 2010.
S. Chow, J. Weng, Y. Yang, R. Deng Efficient unidirectional proxy re-encryption. In AFRICACRYPT 2010, volume 6055 of LNCS, pages 316–332, 2010.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Zhang, J., Wang, B. (2017). On the Security of a Cloud-Based Revocable IBPRE Scheme for Data Sharing. In: Xhafa, F., Barolli, L., Amato, F. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 1. Springer, Cham. https://doi.org/10.1007/978-3-319-49109-7_38
Download citation
DOI: https://doi.org/10.1007/978-3-319-49109-7_38
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-49108-0
Online ISBN: 978-3-319-49109-7
eBook Packages: EngineeringEngineering (R0)