Skip to main content
placeholder image

An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing

Conference Paper


Abstract


  • Identity-based encryption (IBE) eliminates the necessity of

    having a costly certificate verification process. However, revocation remains

    as a daunting task in terms of ciphertext update and key update

    phases. In this paper, we provide an affirmative solution to solve the effi-

    ciency problem incurred by revocation. We propose the first cloud-based

    revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that

    supports user revocation but also delegation of decryption rights. No

    matter a user is revoked or not, at the end of a given time period the

    cloud acting as a proxy will re-encrypt all ciphertexts of the user under

    the current time period to the next time period. If the user is revoked

    in the forthcoming time period, he cannot decrypt the ciphertexts by

    using the expired private key anymore. Comparing to some naive solutions

    which require a private key generator (PKG) to interact with

    non-revoked users in each time period, the new scheme provides definite

    advantages in terms of communication and computation efficiency

UOW Authors


  •   Liang, Kaitai (external author)
  •   Liu, Joseph K. (external author)
  •   Wong, Duncan S. (external author)
  •   Susilo, Willy

Publication Date


  • 2014

Citation


  • Liang, K., Liu, J. K., Wong, D. S. & Susilo, W. (2014). An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. 19th European Symposiun on Research in Computer Securit (ESORICS 2014) (pp. 257-272). Switzerland: Springer International Publishing.

Start Page


  • 257

End Page


  • 272

Place Of Publication


  • Switzerland

Abstract


  • Identity-based encryption (IBE) eliminates the necessity of

    having a costly certificate verification process. However, revocation remains

    as a daunting task in terms of ciphertext update and key update

    phases. In this paper, we provide an affirmative solution to solve the effi-

    ciency problem incurred by revocation. We propose the first cloud-based

    revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that

    supports user revocation but also delegation of decryption rights. No

    matter a user is revoked or not, at the end of a given time period the

    cloud acting as a proxy will re-encrypt all ciphertexts of the user under

    the current time period to the next time period. If the user is revoked

    in the forthcoming time period, he cannot decrypt the ciphertexts by

    using the expired private key anymore. Comparing to some naive solutions

    which require a private key generator (PKG) to interact with

    non-revoked users in each time period, the new scheme provides definite

    advantages in terms of communication and computation efficiency

UOW Authors


  •   Liang, Kaitai (external author)
  •   Liu, Joseph K. (external author)
  •   Wong, Duncan S. (external author)
  •   Susilo, Willy

Publication Date


  • 2014

Citation


  • Liang, K., Liu, J. K., Wong, D. S. & Susilo, W. (2014). An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. 19th European Symposiun on Research in Computer Securit (ESORICS 2014) (pp. 257-272). Switzerland: Springer International Publishing.

Start Page


  • 257

End Page


  • 272

Place Of Publication


  • Switzerland