메뉴 건너뛰기




Volumn 8712 LNCS, Issue PART 1, 2014, Pages 257-272

An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing

Author keywords

cloud based revocable identity based proxy re encryption; revocable identity based encryption; standard model

Indexed keywords

ACCESS CONTROL; SECURITY SYSTEMS;

EID: 84906492583     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-319-11203-9_15     Document Type: Conference Paper
Times cited : (144)

References (35)
  • 1
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • In: Kilian, J. (ed.) Springer, Heidelberg
    • Boneh, D., Franklin,M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) CRYPTO 2001. LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 2
    • 69949166012 scopus 로고    scopus 로고
    • Identity-based encryption with efficient revocation
    • In: Ning, P., Syverson, P.F., Jha, S. (eds.). ACM
    • Boldyreva, A., Goyal, V., Kumar, V.: Identity-based encryption with efficient revocation. In: Ning, P., Syverson, P.F., Jha, S. (eds.) ACM Conference on Computer and Communications Security, pp. 417-426. ACM (2008)
    • (2008) ACM Conference on Computer and Communications Security , pp. 417-426
    • Boldyreva, A.1    Goyal, V.2    Kumar, V.3
  • 3
    • 84865465739 scopus 로고    scopus 로고
    • Dynamic credentials and ciphertext delegation for attribute-based encryption
    • In: Safavi-Naini, R., Canetti, R. (eds.) Springer, Heidelberg
    • Sahai, A., Seyalioglu, H., Waters, B.: Dynamic credentials and ciphertext delegation for attribute-based encryption. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 199-217. Springer, Heidelberg (2012)
    • (2012) CRYPTO 2012. LNCS , vol.7417 , pp. 199-217
    • Sahai, A.1    Seyalioglu, H.2    Waters, B.3
  • 4
    • 38049061546 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption
    • In: Katz, J., Yung, M. (eds.) Springer, Heidelberg
    • Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007)
    • (2007) ACNS 2007. LNCS , vol.4521 , pp. 288-306
    • Green, M.1    Ateniese, G.2
  • 5
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • In: Cramer, R. (ed.) Springer, Heidelberg
    • Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457-473. Springer, Heidelberg (2005)
    • (2005) Eurocrypt 2005. LNCS , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 6
    • 67650112905 scopus 로고    scopus 로고
    • Adaptive-id secure revocable identity-based encryption
    • In: Fischlin, M. (ed.) Springer, Heidelberg
    • Libert, B., Vergnaud, D.: Adaptive-id secure revocable identity-based encryption. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 1-15. Springer, Heidelberg (2009)
    • (2009) CT-RSA 2009. LNCS , vol.5473 , pp. 1-15
    • Libert, B.1    Vergnaud, D.2
  • 7
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • In: Cramer, R. (ed.) Springer, Heidelberg
    • Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
    • (2005) Eurocrypt 2005. LNCS , vol.3494 , pp. 114-127
    • Waters, B.1
  • 8
    • 33746062799 scopus 로고    scopus 로고
    • Practical identity-based encryption without random oracles
    • In: Vaudenay, S. (ed.) Springer, Heidelberg
    • Gentry, C.: Practical identity-based encryption without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 445-464. Springer, Heidelberg (2006)
    • (2006) Eurocrypt 2006. LNCS , vol.4004 , pp. 445-464
    • Gentry, C.1
  • 9
    • 84873951160 scopus 로고    scopus 로고
    • Revocable identity-based encryption revisited: Security model and construction
    • In: Kurosawa, K., Hanaoka, G. (eds.) Springer, Heidelberg
    • Seo, J.H., Emura, K.: Revocable identity-based encryption revisited: Security model and construction. In: Kurosawa, K., Hanaoka, G. (eds.) PKC 2013. LNCS, vol. 7778, pp. 216-234. Springer, Heidelberg (2013)
    • (2013) PKC 2013. LNCS , vol.7778 , pp. 216-234
    • Seo, J.H.1    Emura, K.2
  • 10
    • 35048840186 scopus 로고    scopus 로고
    • Identity-based threshold decryption
    • In: Bao, F., Deng, R., Zhou, J. (eds.) Springer, Heidelberg
    • Baek, J., Zheng, Y.: Identity-based threshold decryption. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 262-276. Springer, Heidelberg (2004)
    • (2004) PKC 2004. LNCS , vol.2947 , pp. 262-276
    • Baek, J.1    Zheng, Y.2
  • 11
    • 35248845998 scopus 로고    scopus 로고
    • Simple identity-based cryptography with mediated rsa
    • In: Joye, M. (ed.) Springer, Heidelberg
    • Ding, X., Tsudik, G.: Simple identity-based cryptography with mediated rsa. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 193-210. Springer, Heidelberg (2003)
    • (2003) CT-RSA 2003. LNCS , vol.2612 , pp. 193-210
    • Ding, X.1    Tsudik, G.2
  • 12
    • 1142293103 scopus 로고    scopus 로고
    • Efficient revocation and threshold pairing based cryptosystems
    • In: Borowsky, E., Rajsbaum, S. (eds.). ACM
    • Libert, B., Quisquater, J.J.: Efficient revocation and threshold pairing based cryptosystems. In: Borowsky, E., Rajsbaum, S. (eds.) PODC, pp. 163-171. ACM (2003)
    • (2003) PODC , pp. 163-171
    • Libert, B.1    Quisquater, J.J.2
  • 13
    • 72449201970 scopus 로고    scopus 로고
    • Attribute-based encryption supporting direct/indirect revocation modes
    • In: Parker, M.G. (ed.) Springer, Heidelberg
    • Attrapadung, N., Imai, H.: Attribute-based encryption supporting direct/indirect revocation modes. In: Parker, M.G. (ed.) Cryptography and Coding 2009. LNCS, vol. 5921, pp. 278-300. Springer, Heidelberg (2009)
    • (2009) Cryptography and Coding 2009. LNCS , vol.5921 , pp. 278-300
    • Attrapadung, N.1    Imai, H.2
  • 14
    • 69949143544 scopus 로고    scopus 로고
    • Conjunctive broadcast and attribute-based encryption
    • In: Shacham, H., Waters, B. (eds.) Springer, Heidelberg
    • Attrapadung, N., Imai, H.: Conjunctive broadcast and attribute-based encryption. In: Shacham, H., Waters, B. (eds.) Pairing 2009. LNCS, vol. 5671, pp. 248-265. Springer, Heidelberg (2009)
    • (2009) Pairing 2009. LNCS , vol.5671 , pp. 248-265
    • Attrapadung, N.1    Imai, H.2
  • 15
    • 84864808088 scopus 로고    scopus 로고
    • Fully private revocable predicate encryption
    • In: Susilo, W., Mu, Y., Seberry, J. (eds.) Springer, Heidelberg
    • Nieto, J.M.G., Manulis, M., Sun, D.: Fully private revocable predicate encryption. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol. 7372, pp. 350-363. Springer, Heidelberg (2012)
    • (2012) ACISP 2012. LNCS , vol.7372 , pp. 350-363
    • Nieto, J.M.G.1    Manulis, M.2    Sun, D.3
  • 16
    • 0030687206 scopus 로고    scopus 로고
    • Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
    • Mambo, M., Okamoto, E.: Proxy cryptosystems: Delegation of the power to decrypt ciphertexts. IEICE Transactions E80-A(1), 54-63 (1997)
    • (1997) IEICE Transactions , vol.E80-A , Issue.1 , pp. 54-63
    • Mambo, M.1    Okamoto, E.2
  • 17
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • In: Nyberg, K. (ed.) Springer, Heidelberg
    • Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998)
    • (1998) Eurocrypt 1998. LNCS , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 18
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1-30 (2006)
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 19
    • 77952361637 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption
    • In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.). ACM
    • Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, pp. 185-194. ACM (2007)
    • (2007) ACM Conference on Computer and Communications Security , pp. 185-194
    • Canetti, R.1    Hohenberger, S.2
  • 20
    • 84874289731 scopus 로고    scopus 로고
    • Proxy re-encryption in a stronger security model extended from ct-rsa2012
    • In: Dawson, E. (ed.) Springer, Heidelberg
    • Isshiki, T., Nguyen, M.H., Tanaka, K.: Proxy re-encryption in a stronger security model extended from ct-rsa2012. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol. 7779, pp. 277-292. Springer, Heidelberg (2013)
    • (2013) CT-RSA 2013. LNCS , vol.7779 , pp. 277-292
    • Isshiki, T.1    Nguyen, M.H.2    Tanaka, K.3
  • 21
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy reencryption
    • In: Cramer, R. (ed.) Springer, Heidelberg
    • Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy reencryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
    • (2008) PKC 2008. LNCS , vol.4939 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2
  • 22
    • 84863280137 scopus 로고    scopus 로고
    • Generic construction of chosen ciphertext secure proxy re-encryption
    • In: Dunkelman, O. (ed.) Springer, Heidelberg
    • Hanaoka, G., Kawai, Y., Kunihiro, N., Matsuda, T., Weng, J., Zhang, R., Zhao, Y.: Generic construction of chosen ciphertext secure proxy re-encryption. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 349-364. Springer, Heidelberg (2012)
    • (2012) CT-RSA 2012. LNCS , vol.7178 , pp. 349-364
    • Hanaoka, G.1    Kawai, Y.2    Kunihiro, N.3    Matsuda, T.4    Weng, J.5    Zhang, R.6    Zhao, Y.7
  • 23
    • 67650109748 scopus 로고    scopus 로고
    • Inter-domain identity-based proxy reencryption
    • In: Yung, M., Liu, P., Lin, D. (eds.) Springer, Heidelberg
    • Tang, Q., Hartel, P.H., Jonker, W.: Inter-domain identity-based proxy reencryption. In: Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. LNCS, vol. 5487, pp. 332-347. Springer, Heidelberg (2009)
    • (2009) Inscrypt 2008. LNCS , vol.5487 , pp. 332-347
    • Tang, Q.1    Hartel, P.H.2    Jonker, W.3
  • 24
    • 38149038713 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption without random oracles
    • In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) Springer, Heidelberg
    • Chu, C.-K., Tzeng, W.-G.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 189-202. Springer, Heidelberg (2007)
    • (2007) ISC 2007. LNCS , vol.4779 , pp. 189-202
    • Chu, C.-K.1    Tzeng, W.-G.2
  • 25
    • 35248875326 scopus 로고    scopus 로고
    • Relaxing chosen-ciphertext security
    • In: Boneh, D. (ed.) Springer, Heidelberg
    • Canetti, R., Krawczyk, H., Nielsen, J.B.: Relaxing chosen-ciphertext security. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 565-582. Springer, Heidelberg (2003)
    • (2003) CRYPTO 2003. LNCS , vol.2729 , pp. 565-582
    • Canetti, R.1    Krawczyk, H.2    Nielsen, J.B.3
  • 26
    • 50049099260 scopus 로고    scopus 로고
    • Proxy re-encryption systems for identity-based encryption
    • In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Springer, Heidelberg
    • Matsuo, T.: Proxy re-encryption systems for identity-based encryption. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 247-267. Springer, Heidelberg (2007)
    • (2007) Pairing 2007. LNCS , vol.4575 , pp. 247-267
    • Matsuo, T.1
  • 27
    • 84855307392 scopus 로고    scopus 로고
    • Identity-based proxy cryptosystems with revocability and hierarchical confidentialities
    • Wang, L.,Wang, L., Mambo, M., Okamoto, E.: Identity-based proxy cryptosystems with revocability and hierarchical confidentialities. IEICE Transactions 95-A(1), 70-88 (2012)
    • (2012) IEICE Transactions , vol.95 A , Issue.1 , pp. 70-88
    • Wang, L.1    Wang, L.2    Mambo, M.3    Okamoto, E.4
  • 28
    • 78650288030 scopus 로고    scopus 로고
    • New identity-based proxy reencryption schemes to prevent collusion attacks
    • In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Springer, Heidelberg
    • Wang, L., Wang, L., Mambo, M., Okamoto, E.: New identity-based proxy reencryption schemes to prevent collusion attacks. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol. 6487, pp. 327-346. Springer, Heidelberg (2010)
    • (2010) Pairing 2010. LNCS , vol.6487 , pp. 327-346
    • Wang, L.1    Wang, L.2    Mambo, M.3    Okamoto, E.4
  • 29
    • 78650937188 scopus 로고    scopus 로고
    • Secure and efficient IBE-PKE proxy re-encryption
    • Mizuno, T., Doi, H.: Secure and efficient IBE-PKE proxy re-encryption. IEICE Transactions E94-A(1), 36-44 (2011)
    • (2011) IEICE Transactions , vol.E94-A , Issue.1 , pp. 36-44
    • Mizuno, T.1    Doi, H.2
  • 30
    • 84864644840 scopus 로고    scopus 로고
    • Fully secure unidirectional identity-based proxy reencryption
    • In: Kim, H. (ed.) Springer, Heidelberg
    • Luo, S., Shen, Q., Chen, Z.: Fully secure unidirectional identity-based proxy reencryption. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 109-126. Springer, Heidelberg (2012)
    • (2012) ICISC 2011. LNCS , vol.7259 , pp. 109-126
    • Luo, S.1    Shen, Q.2    Chen, Z.3
  • 31
    • 84861582429 scopus 로고    scopus 로고
    • Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
    • Shao, J., Cao, Z.: Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Information Sciences 206, 83-95 (2012)
    • (2012) Information Sciences , vol.206 , pp. 83-95
    • Shao, J.1    Cao, Z.2
  • 32
    • 84875985547 scopus 로고    scopus 로고
    • A CCA-secure identity-based conditional proxy re-encryption without random oracles
    • In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) Springer, Heidelberg
    • Liang, K., Liu, Z., Tan, X., Wong, D.S., Tang, C.: A CCA-secure identity-based conditional proxy re-encryption without random oracles. In: Kwon, T., Lee, M.-K., Kwon, D. (eds.) ICISC 2012. LNCS, vol. 7839, pp. 231-246. Springer, Heidelberg (2013)
    • (2013) ICISC 2012. LNCS , vol.7839 , pp. 231-246
    • Liang, K.1    Liu, Z.2    Tan, X.3    Wong, D.S.4    Tang, C.5
  • 34
    • 84880174080 scopus 로고    scopus 로고
    • Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
    • Phan, D.H., Pointcheval, D., Shahandashti, S.F., Strefler, M.: Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts. Int. J. Inf. Sec. 12(4), 251-265 (2013)
    • (2013) Int. J. Inf. Sec. , vol.12 , Issue.4 , pp. 251-265
    • Phan, D.H.1    Pointcheval, D.2    Shahandashti, S.F.3    Strefler, M.4
  • 35
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) Springer, Heidelberg
    • Waters, B.: Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 53-70. Springer, Heidelberg (2011)
    • (2011) PKC 2011. LNCS , vol.6571 , pp. 53-70
    • Waters, B.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.