Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds

@article{Chen2018EfficientKP,
  title={Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds},
  author={Wei-Hao Chen and Chun-I Fan and Yi-Fan Tseng},
  journal={2018 IEEE Conference on Dependable and Secure Computing (DSC)},
  year={2018},
  pages={1-4}
}
Cloud computing undoubtedly is the most unparalleled technique in rapidly developing industries. Protecting sensitive files stored in the clouds from being accessed by malicious attackers is essential to the success of the clouds. In proxy re-encryption schemes, users delegate their encrypted files to other users by using re-encryption keys, which elegantly transfers the users' burden to the cloud servers. Moreover, one can adopt conditional proxy re-encryption schemes to employ their access… 

Figures and Tables from this paper

Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map

TLDR
The multilinear maps are applied to the key-aggregate proxy re-encryption to extend the number of conditions to be exponentially large, while keeping the size of public parameters small and practical.

EFFICIENT MUTUAL USER AUTHENTICATION PROTOCOL TO SHARE FILES USING ID IN CLOUD STORAGE

TLDR
This paper proposes a Mutual User Authentication Protocol (MUAP) in which the users can safely share their data in a suspicious cloud servers and provides assurance on data over user security and focussed mainly on data sharing among the users by an encrypted way.

An Improved ID-Based Data Storage Scheme for Fog-Enabled IoT Environments

TLDR
An improved variant of this protocol is presented, which not only eliminates their security weaknesses, but also preserves the functionalities of anonymous key generation and user revocation mechanism and is also provably secure in the security notion of IND-PrID-CPA.

Cloud Data Security in Multi Model Attributes For Randomized Key Service Using Encryption Techniques

TLDR
An efficient Service LevelAttributeBasedEncryption (SLABE) scheme is presented and a multi attribute randomized key Service Level Encryption (MARK-SLE) scheme has been presented to improve the security performance.

BCSolid: A Blockchain-Based Decentralized Data Storage and Authentication Scheme for Solid

TLDR
A blockchain-based decentralized data storage and authentication scheme for Solid, termed BCSolid, in which a user’s data can be independent of multiple web applications and can switch data storage service easily without relying on a trusted third party is proposed.

Synthesizing Privacy Preserving Traces: Enhancing Plausibility With Social Networks

TLDR
The main idea is to credibly imitate the temporal, spatial, and social behavior of users’ mobility, sample the traces that exhibit similar three-dimension mobility behavior, and synthesize traces using the sampled locations to provide "differential privacy" on location privacy preservation.

An Analysis on Data Sharing for Effective Health Monitoring in Internet of Things

TLDR
The practice described in the article aims to provide end-users with important understanding into in-depth physical layer set-up with relieve from complicated and varied nature of monitoring devices via reducing the shared infrastructure to a single representative source for accessibility.

Image Driven Multi Feature Plant Management with FDE Based Smart Agriculture with Improved Security in Wireless Sensor Networks

TLDR
An efficient multi feature multi feature plant management framework that improves the security in smart agriculture and improves the performance is proposed in this paper.

References

SHOWING 1-10 OF 16 REFERENCES

Key-Private Proxy Re-encryption

TLDR
This work proposes the first key-private PRE construction and proves its CPA-security under a simple extension of Decisional Bilinear Diffie Hellman assumption and its key-privacy under the Decision Linear assumption in the standard model.

Conditional Proxy Broadcast Re-Encryption

TLDR
This paper introduces a more generalized notion of conditional proxy broadcast re-encryption (CPBRE), and proposes a basic CPBRE scheme secure against chosen-plaintext attacks, and its extension which is secure against replayable chosen-ciphertext attacks (RCCA).

Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage

TLDR
New public-key cryptosystems that produce constant-size ciphertexts such that efficient delegation of decryption rights for any set of ciphertextS are possible are described, giving the first public-keys patient-controlled encryption for flexible hierarchy.

Chosen-Ciphertext Secure Proxy Re-encryption without Pairings

TLDR
A new proxy re-encryption scheme without resort to bilinear pairings is proposed, and the chosen-ciphertext security of the proposed scheme is proved in the random oracle model.

Chosen-ciphertext secure proxy re-encryption

TLDR
This work proposes a definition of security against chosen ciphertext attacks for PRE schemes, and presents a scheme that satisfies the definition and formally captures CCA security for PRE scheme via both a game-based definition and simulation-based definitions that guarantee universally composable security.

A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles

TLDR
A new unidirectional single-hop Identity-Based Conditional Proxy Re-Encryption (IBCPRE) scheme that not only captures the property of IBPRE, but also supports conditional re-encryption and can be proved secure against adaptive condition and adaptive identity chosen-ciphertext attacks in the standard model.

Identity-Based Proxy Re-encryption

TLDR
This paper addresses the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identity to another, and develops two schemes that are compatible with current IBE deployments and do not require any extra work from the IBE trusted-party key generator.

Conditional proxy re-encryption secure against chosen-ciphertext attack

TLDR
This work formalizes its security model and proposes an efficient C-PRE scheme, whose chosen-ciphertext security is proven under the 3-quotient bilinear Diffie-Hellman assumption.

Anonymous Conditional Proxy Re-encryption without Random Oracle

TLDR
This paper answers the question posed by Weng et al. affirmatively by presenting a new and efficient construction of anonymous conditional proxy re-encryption (C-PRE) scheme without requiring random oracle.

CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles

TLDR
This work proposes a new unidirectional proxy re-encryption scheme, and proves its chosen-ciphertext security in the adaptive corruption model without random oracles, and enjoys the advantages of both higher efficiency and stronger security.