Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds
Title | Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Chen, Wei-Hao, Fan, Chun-I, Tseng, Yi-Fan |
Conference Name | 2018 IEEE Conference on Dependable and Secure Computing (DSC) |
Date Published | dec |
ISBN Number | 978-1-5386-5790-4 |
Keywords | Access Control, authorisation, cloud computing, cloud servers, composability, Computer science, conditional proxy re-encryption schemes, cryptography, Cyber physical system, cyber physical systems, efficient encryption, efficient key-aggregate proxy re-encryption, encrypted files, Encryption, key-aggregate approach, Key-Aggregate Cryptosystem, key-aggregate proxy re-encryption scheme, protecting sensitive files, Proxy re-encryption, pubcrawl, Public key, re-encryption keys, resilience, Resiliency, secure data sharing |
Abstract | Cloud computing undoubtedly is the most unparalleled technique in rapidly developing industries. Protecting sensitive files stored in the clouds from being accessed by malicious attackers is essential to the success of the clouds. In proxy re-encryption schemes, users delegate their encrypted files to other users by using re-encryption keys, which elegantly transfers the users' burden to the cloud servers. Moreover, one can adopt conditional proxy re-encryption schemes to employ their access control policy on the files to be shared. However, we recognize that the size of re-encryption keys will grow linearly with the number of the condition values, which may be impractical in low computational devices. In this paper, we combine a key-aggregate approach and a proxy re-encryption scheme into a key-aggregate proxy re-encryption scheme. It is worth mentioning that the proposed scheme is the first key-aggregate proxy re-encryption scheme. As a side note, the size of re-encryption keys is constant. |
URL | https://ieeexplore.ieee.org/document/8625149 |
DOI | 10.1109/DESEC.2018.8625149 |
Citation Key | chen_efficient_2018 |
- encrypted files
- secure data sharing
- Resiliency
- resilience
- re-encryption keys
- Public key
- pubcrawl
- Proxy re-encryption
- protecting sensitive files
- key-aggregate proxy re-encryption scheme
- Key-Aggregate Cryptosystem
- key-aggregate approach
- encryption
- Access Control
- efficient key-aggregate proxy re-encryption
- efficient encryption
- cyber physical systems
- Cyber Physical System
- Cryptography
- conditional proxy re-encryption schemes
- computer science
- composability
- cloud servers
- Cloud Computing
- authorisation