Secure bidirectional proxy re-encryption for cryptographic cloud storage
نویسندگان
چکیده
Bidirectional proxy re-encryption allows ciphertext transformation between Alice and Bob via a semi-trusted proxy, who however cannot obtain the corresponding plaintext. Due to this special property, bidirectional proxy re-encryption has become a flexible tool in many dynamic environments, such as cryptographic cloud storage. Nonetheless, how to design a secure and efficient bidirectional proxy re-encryption is still challenging. In this paper, we propose a novel bidirectional proxy re-encryption scheme that holds the following properties: 1) constant ciphertext size no matter how many times the transformation is performed; 2) master secret security in the random oracle model, i.e., Alice (resp. Bob) colluding with the proxy cannot obtain Bob’s (resp. Alice’s) private key; 3) replayable chosen ciphertext (RCCA) security in the random oracle model. The above three properties are usually required in the cryptographic cloud storage. Furthermore, the proposed new master secret security may be of independent interest, as it is closer to the original desire: delegate the decryption rights while keeping the signing rights.
منابع مشابه
Survey on Cryptographic Schemes for Security in Cloud Data Storage
A Cloud data storage system consists of collection of storage servers over the internet which provides long term storage services. The data stored in a third party’s cloud system may cause serious concern over data confidentiality. To keep sensitive user data confidential against un-trusted servers and to provide security, access control in cloud there are some cryptographic techniques speciall...
متن کاملA Secure Code Based Cloud Storage System Using Proxy Re-Encryption Scheme in Cloud Computing
Cloud computing is a model for enabling convenient, on demand network access to a shared pool of computing resources. The cloud storage system consists of a collection of storage servers and key servers. Storing data in a third party cloud system causes serious concern on data confidentiality, so a user divides the data into blocks, encrypts and stores them in various storage servers. The stora...
متن کاملProviding a Secure Data Forwarding in Cloud Storage System Using Threshold Proxy Re-encryption Scheme
Cloud computing treats the resources on the Internet as a unified entity, cloud. A cloud storage system is considered as a large scale distributed storage system that consists of many independent storage servers. Storing data in a third party’s cloud system causes serious concern on data confidentiality. In order to provide strong confidentiality for messages in storage servers, a user can encr...
متن کاملEfficient Proxy Re-encryption with Private Keyword Searching in Untrusted Storage
Cloud computing is an important trend that in many ways is beginning to fulfill the early promise of the Internet and creating unanticipated change in computing paradigm. As promising as cloud computing is, this paradigm brings forth new security and privacy challenges when operating in the untrusted cloud scenarios. Motivated by the challenging problem “Private Searching over Encrypted Data”, ...
متن کاملTowards an Efficient and Secure Online Digital Rights Management Scheme in Cloud Computing
Streaming media is widely adopted by thousands of applications in cloud computing, how to effectively protect streaming media contents is a new challenge. In this paper, we propose an efficient online digital rights management (DRM) scheme supporting dynamic license in cloud computing. The content provider encrypts media content and outsources the encrypted content to cloud storage, while the u...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Pervasive and Mobile Computing
دوره 28 شماره
صفحات -
تاریخ انتشار 2016