Skip to main content

On the Security of a Cloud-Based Revocable IBPRE Scheme for Data Sharing

  • Conference paper
  • First Online:
Advances on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC 2016)

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 1))

  • 1689 Accesses

Abstract

In ESORICS2014, Liang et al. proposed an efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing, aimed at both supporting user revocation and delegation of decryption rights. The main strategy is to let the cloud periodic re-encrypt ciphertexts under the current time period to the next time period. If the user is revoked in the forth coming time period, he cannot decrypt the ciphertexts by using the expired private key anymore. Compared with traditional revocation technique by using PKG, this method has the advantage of computation and communication efficiency. However, in this paper we show an attack which allow the revoked user can decrypt the ciphertexts under the future time period, if the revoked users colludes with the proxy. Although cloud-based revocable identity based proxy re-encryption is a great idea for public cloud storage sharing, it needs further research before this scheme can be practically adapted.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. G. Ateniese, K. Fu, M. Green and S. Hohenberger. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. In NDSS(2005), pages 29–43.

    Google Scholar 

  2. G. Ateniese, K. Fu, M. Green and S. Hohenberger. Improved proxy re-encryption schemes with applications to secure distributed storage. In ACM Transation Information System Security 9 (2006), no. 1, pages 1–30.

    Google Scholar 

  3. M. Blaze, G. Bleumer and M. Strauss. Divertible Protocols and Atomic Proxy Cryptography. In Advances in Cryptology - Eurocrypt’98, LNCS 1403, pp. 127–144. Springer–Verlag, 1998.

    Google Scholar 

  4. R. Canetti and S. Hohenberger, Chosen Ciphertext Secure Proxy Re-encryption. In ACM CCS 2007, pp. 185–194.2007.

    Google Scholar 

  5. R. Deng, J.Weng, S. Liu and K. Chen. Chosen Ciphertext Secure Proxy Re-encryption without Pairing. In CANS’08, LNCS 5339, pp.1-17, Springer-Verlag, 2008.

    Google Scholar 

  6. M. Green and G. Ateniese. Identity-based proxy re-encryption. In ACNS 2007, volume 4521 of LNCS, pages 288–306, 2007.

    Google Scholar 

  7. B. Libert and D. Vergnaud. Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. In PKC 2008, LNCS 4939, pages 360–379, Springer–Verlag, 2008.

    Google Scholar 

  8. B. Libert and D. Vergnaud. Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption. In IEEE Transactions on Information Theory, vol. 57, No. 3, pages 1786–1802, 2011.

    Google Scholar 

  9. K. Liang, W. Susilo, J. K. Liu. Privacy-Preserving Ciphertext Multi-Sharing Control for Big Data Storage. In IEEE Transactions on Information Forensics and Security, Vol. 10, No. 8, pages 1578–1589, 2015.

    Google Scholar 

  10. K. Liang, M. H. Au, J. K. Liu, W. Susilo, D. S. Wong, G. Yang, T. Phuong, Q. Xie. A DFABased Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing. In IEEE Transactions on Information Forensics and Security, Vol. 9, No. 10, pages 1667–1680, 2014.

    Google Scholar 

  11. K. Liang, W. Susilo. Searchable Attribute-Based Mechanism With Efficient Data Sharing for Secure Cloud Storage. In IEEE Transactions on Information Forensics and Security, Vol. 10, No. 9, pages 1981–1992, 2015.

    Google Scholar 

  12. J. Shao and Z. Cao. CCA-secure proxy re-encryption without pairing. In PKC 2009, LNCS 5443, pages. 357–376, Springer–Verlag, 2009.

    Google Scholar 

  13. J. Shao, Z. Cao, P. Lin. Generic construction for CCA-secure unidirectional proxy reencryption. In Security and Communication Networks, no. 2, pages 1-16, 2009.

    Google Scholar 

  14. J. Weng, R. H. Deng, C. Chu, X. Ding, and J. Lai. Conditional proxy re-encryption secure against chosen-ciphertext attack. In ACM ASIACCS 2009, pages 322–332, 2009.

    Google Scholar 

  15. J. Weng, Y. Yang, Q. Tang, R. Deng, and F. Bao. Efficient conditional proxy re-encryption with chosen-ciphertext security. In ISC 2009, volume 5735 of LNCS, pages 151–166, 2009.

    Google Scholar 

  16. J. Weng, Y. Zhao, G. Hanaoka. On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010. In PKC 2011, pages 284-295, 2011.

    Google Scholar 

  17. J. Weng, M. Chen, Y. Yang, R. Deng, K. Chen and F. Bao CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. In Science China Information Sciences, 53, : 593-606, 2010.

    Google Scholar 

  18. S. Chow, J. Weng, Y. Yang, R. Deng Efficient unidirectional proxy re-encryption. In AFRICACRYPT 2010, volume 6055 of LNCS, pages 316–332, 2010.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Baocang Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Zhang, J., Wang, B. (2017). On the Security of a Cloud-Based Revocable IBPRE Scheme for Data Sharing. In: Xhafa, F., Barolli, L., Amato, F. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2016. Lecture Notes on Data Engineering and Communications Technologies, vol 1. Springer, Cham. https://doi.org/10.1007/978-3-319-49109-7_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-49109-7_38

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-49108-0

  • Online ISBN: 978-3-319-49109-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics