Skip to main content
placeholder image

An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing

Journal Article


Abstract


  • Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification process. However, revocation remains as a daunting task in terms of ciphertext update and key update phases. In this paper, we provide an affirmative solution to solve the efficiency problem incurred by revocation. We propose the first cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation but also delegation of decryption rights. No matter a user is revoked or not, at the end of a given time period the cloud acting as a proxy will re-encrypt all ciphertexts of the user under the current time period to the next time period. If the user is revoked in the forthcoming time period, he cannot decrypt the ciphertexts by using the expired private key anymore. comparing to some naive solutions which require a private key generator (PKG) to interact with non-revoked users in each time period, the new scheme provides definite advantages in terms of communication and computation efficiency. © 2014 Springer International Publishing Switzerland.

  • Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification process. However, revocation remains as a daunting task in terms of ciphertext update and key update phases. In this paper, we provide an affirmative solution to solve the efficiency problem incurred by revocation. We propose the first cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation but also delegation of decryption rights. No matter a user is revoked or not, at the end of a given time period the cloud acting as a proxy will re-encrypt all ciphertexts of the user under the current time period to the next time period. If the user is revoked in the forthcoming time period, he cannot decrypt the ciphertexts by using the expired private key anymore. comparing to some naive solutions which require a private key generator (PKG) to interact with non-revoked users in each time period, the new scheme provides definite advantages in terms of communication and computation efficiency. © 2014 Springer International Publishing Switzerland.

UOW Authors


  •   Liang, Kaitai (external author)
  •   Liu, J K. (external author)
  •   Wong, Duncan S. (external author)
  •   Susilo, Willy

Publication Date


  • 2014

Citation


  • Liang, K., Liu, J. K., Wong, D. S. & Susilo, W. (2014). An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. Lecture Notes in Computer Science, 8712 (PART 1), 257-272.

Scopus Eid


  • 2-s2.0-84906492583

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/4126

Has Global Citation Frequency


Number Of Pages


  • 15

Start Page


  • 257

End Page


  • 272

Volume


  • 8712

Issue


  • PART 1

Place Of Publication


  • Germany

Abstract


  • Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification process. However, revocation remains as a daunting task in terms of ciphertext update and key update phases. In this paper, we provide an affirmative solution to solve the efficiency problem incurred by revocation. We propose the first cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation but also delegation of decryption rights. No matter a user is revoked or not, at the end of a given time period the cloud acting as a proxy will re-encrypt all ciphertexts of the user under the current time period to the next time period. If the user is revoked in the forthcoming time period, he cannot decrypt the ciphertexts by using the expired private key anymore. comparing to some naive solutions which require a private key generator (PKG) to interact with non-revoked users in each time period, the new scheme provides definite advantages in terms of communication and computation efficiency. © 2014 Springer International Publishing Switzerland.

  • Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification process. However, revocation remains as a daunting task in terms of ciphertext update and key update phases. In this paper, we provide an affirmative solution to solve the efficiency problem incurred by revocation. We propose the first cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation but also delegation of decryption rights. No matter a user is revoked or not, at the end of a given time period the cloud acting as a proxy will re-encrypt all ciphertexts of the user under the current time period to the next time period. If the user is revoked in the forthcoming time period, he cannot decrypt the ciphertexts by using the expired private key anymore. comparing to some naive solutions which require a private key generator (PKG) to interact with non-revoked users in each time period, the new scheme provides definite advantages in terms of communication and computation efficiency. © 2014 Springer International Publishing Switzerland.

UOW Authors


  •   Liang, Kaitai (external author)
  •   Liu, J K. (external author)
  •   Wong, Duncan S. (external author)
  •   Susilo, Willy

Publication Date


  • 2014

Citation


  • Liang, K., Liu, J. K., Wong, D. S. & Susilo, W. (2014). An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. Lecture Notes in Computer Science, 8712 (PART 1), 257-272.

Scopus Eid


  • 2-s2.0-84906492583

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers/4126

Has Global Citation Frequency


Number Of Pages


  • 15

Start Page


  • 257

End Page


  • 272

Volume


  • 8712

Issue


  • PART 1

Place Of Publication


  • Germany