Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing

Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important technology for data sharing between users.Howev...

Full description

Saved in:
Bibliographic Details
Main Authors: Shang LIU, Yinzhang GUO
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2022-06-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022033
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529749707423744
author Shang LIU
Yinzhang GUO
author_facet Shang LIU
Yinzhang GUO
author_sort Shang LIU
collection DOAJ
description Proxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important technology for data sharing between users.However, the proxy re-encryption schemes are mostly based on single authority, which have some problems such as single power and performance bottleneck of the authority organization and high computing burden on user’s client.At the same time, most schemes do not have the five basic characteristics of proxy re-encryption: one-way encryption, non-interaction, repeatability, controllability and verifiability.In order to solve these problems, a CP-ABE proxy re-encryption scheme for cloud computing based on multi-authority with repeatability and controllability was proposed.Based on the ciphertext policy attribute encryption scheme, proxy servers of encryption and decryption were introduced to reduce the computing burden on the user’s client, and multi-attribute authorization were set to disperse the authority of the central authority.The proxy re-encryption was improved from multiple aspects.Random factors and ciphertext sub-item set in the re-encryption key can realize one-way encryption and controllability.The re-encryption key was independently generated by the client without the participation of servers, which can support users to share data when the data owner is not online.Encrypting the ciphertext sub-item set in the initial ciphertext many times can achieve repeatability.The verification sub-item set in the initial ciphertext allowed the user to verify whether the outsourcing and re-encryption results were correct.Compared with other schemes, the user’s client computing overhead of the proposed scheme was small, and the user can decrypt the original ciphertext only by performing constant times of exponential operation.Based on q-parallel BDHE assumption, the security analysis showed that the proposed scheme is secure against chosen-ciphertext attack (CCA) under the standard model.
format Article
id doaj-art-e1cf750cf7d34abba5f4842296276d2a
institution Kabale University
issn 2096-109X
language English
publishDate 2022-06-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-e1cf750cf7d34abba5f4842296276d2a2025-01-15T03:15:51ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2022-06-01817618859572820Multi-authority based CP-ABE proxy re-encryption scheme for cloud computingShang LIUYinzhang GUOProxy re-encryption allows a proxy to convert a ciphertext related to a certain access policy into another one with a different access policy without uncovering the underlying plaintext, which makes the proxy re-encryption technology to be an important technology for data sharing between users.However, the proxy re-encryption schemes are mostly based on single authority, which have some problems such as single power and performance bottleneck of the authority organization and high computing burden on user’s client.At the same time, most schemes do not have the five basic characteristics of proxy re-encryption: one-way encryption, non-interaction, repeatability, controllability and verifiability.In order to solve these problems, a CP-ABE proxy re-encryption scheme for cloud computing based on multi-authority with repeatability and controllability was proposed.Based on the ciphertext policy attribute encryption scheme, proxy servers of encryption and decryption were introduced to reduce the computing burden on the user’s client, and multi-attribute authorization were set to disperse the authority of the central authority.The proxy re-encryption was improved from multiple aspects.Random factors and ciphertext sub-item set in the re-encryption key can realize one-way encryption and controllability.The re-encryption key was independently generated by the client without the participation of servers, which can support users to share data when the data owner is not online.Encrypting the ciphertext sub-item set in the initial ciphertext many times can achieve repeatability.The verification sub-item set in the initial ciphertext allowed the user to verify whether the outsourcing and re-encryption results were correct.Compared with other schemes, the user’s client computing overhead of the proposed scheme was small, and the user can decrypt the original ciphertext only by performing constant times of exponential operation.Based on q-parallel BDHE assumption, the security analysis showed that the proposed scheme is secure against chosen-ciphertext attack (CCA) under the standard model.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022033repeatabilitycontrollabilitycloud computingmulti-authorityproxy re-encryption
spellingShingle Shang LIU
Yinzhang GUO
Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
网络与信息安全学报
repeatability
controllability
cloud computing
multi-authority
proxy re-encryption
title Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
title_full Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
title_fullStr Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
title_full_unstemmed Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
title_short Multi-authority based CP-ABE proxy re-encryption scheme for cloud computing
title_sort multi authority based cp abe proxy re encryption scheme for cloud computing
topic repeatability
controllability
cloud computing
multi-authority
proxy re-encryption
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2022033
work_keys_str_mv AT shangliu multiauthoritybasedcpabeproxyreencryptionschemeforcloudcomputing
AT yinzhangguo multiauthoritybasedcpabeproxyreencryptionschemeforcloudcomputing