Ciphertext Sharing Scheme for the Public Cloud
Author:
Affiliation:

Fund Project:

National Key Technology R&D Program of China (2014BAH11F02); National Natural Science Foundation of China (61373163); Project of Network and Data Security Key Laboratory of Sichuan Province

  • Article
  • | |
  • Metrics
  • |
  • Reference [16]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    In view of the existing ciphertext sharing scheme, there is too large calculation of user clients, and each user manages too many secret keys. Moreover, it does not support personal sharing and other issues. Thus the Public Cloud is introduced into the ciphertext sharing scheme, and a security file-sharing framework of the Public Cloud is proposed. And based on this framework, a new ciphertext sharing scheme is designed. In this scheme, the vast majority of computation and storage are outsourced to the Public Cloud. The user simply saves two private key components occupying small space. The client only needs a little computation to complete encryption and decryption of the shared file. The security analysis shows that the scheme can deal with not only the conspiracy attack from malicious users, but also the plaintext-chosen attack in the generic group model and the random oracle model.

    Reference
    [1] Bethencourt J, Sahai A, Waters B. Ciphertext-policy attribute-based encryption. In:Proc. of the 2007 IEEE Symp. on Security and Privacy. Washington:IEEE Computer Society, 2007. 321-334.[doi:10.1109/SP.2007.11]
    [2] Cheung L, Newport C. Provably secure ciphertext policy ABE. In:Proc. of the 14th ACM conference on Computer and Communications Security. New York:ACM Press, 2007. 456-465.[doi:10.1145/1315245.1315302]
    [3] Goyal V, Jain, Pandey O, Sahai A. Bounded ciphertext policy attribute based encryption. In:Proc. of the 35th Int'l Colloquium on Automata, Languages and Programming. Berlin:Springer-Verlag, 2008. 579-591.
    [4] Bobba R, Khurana H, Prabhakaran M. Attribute-sets:A practically motivated enhancement to attribute-based encryption. In:Proc. of the ESORICS. Berlin:Springer-Verlag, 2009. 587-604.
    [5] Waters B. Ciphertext-policy attribute-based encryption:An expressive, efficient, and provably secure realization. In:Proc. of the Public Key Cryptography (PKC 2011). Berlin:Springer-Verlag, 2011. 53-70.[doi:10.1007/978-3-642-19379-8_4]
    [6] Beimel A. Secure schemes for secret sharing and key distribution[Ph.D. Thesis]. Haifa:Israel Institute of Technology, 1996.
    [7] Lewko A, Waters B. Decentralizing attribute-based encryption. In:Paterson K, ed. Advances in Cryptology-EUROCRYPT 2011. Berlin:Springer-Verlag, 2011. 568-588.[doi:10.1007/978-3-642-20465-4_31]
    [8] Waters B. Efficient identity-based encryption without random oracles. In:Proc. of the EUROCRYPT 2005. Berlin, Heidelberg:Springer-Verlag, 2005. 114-127.[doi:10.1007/11426639_7]
    [9] Balu A, Kuppusamy K. An expressive and provably secure ciphertext-policy attribute-based encryption. Information Sciences, 2014,276(4):354-362.
    [10] Yu SC, Wang C, Ren K, Lou WJ. Attribute based data sharing with attribute revocation. In:Proc. of the 5th ACM Symp. on Information, Computer and Communications Security. New York:ACM Press, 2010. 261-270.[doi:10.1145/1755688.1755720]
    [11] Wang PP, Feng DG, Zhang LW. CP-ABE scheme supporting fully fine-grained attribute revocation. Ruan Jian Xue Bao/Journal of Software, 2012,23(10):2805-2816(in Chinese with English abstract). http://www.jos.org.cn/1000-9825/4184.htm[doi:10.3724/SP. J.1001.2012.04184]
    [12] Hur J. Improving security and efficiency in attribute-based data sharing. IEEE Trans. on Knowledge & Data Engineering, 2013, 25(10):2271-2282.
    [13] Wan Z, Liu JE, Deng RH. HASBE:A hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans. on Information Forensics and Security, 2012,7(2):743-754.
    [14] Yang K, Jia XH, Ren K, Xie RT, and Huang LS. Enabling efficient access control with dynamic policy updating for big data in the cloud. In:Proc. of the INFOCOM 2014. Toronto:IEEE Press, 2014. 2013-2021.[10.1109/INFOCOM.2014.6848142]
    附中文参考文献:
    [11] 王鹏翩,冯登国,张立武.一种支持完全细粒度属性撤销的CP-ABE方案.软件学报,2012,23(10):2271-2282. http://www.jos.org.cn/1000-9825/4184.htm[doi:10.3724/SP.J.1001.2012.04184]
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

罗王平,冯朝胜,秦志光,袁丁,廖娟平,刘霞.一种面向公有云的密文共享方案.软件学报,2019,30(8):2517-2527

Copy
Share
Article Metrics
  • Abstract:
  • PDF:
  • HTML:
  • Cited by:
History
  • Received:June 15,2017
  • Revised:October 09,2017
  • Online: August 08,2019
You are the first2032497Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063