메뉴 건너뛰기




Volumn 28, Issue , 2016, Pages 122-134

Cloud based data sharing with fine-grained proxy re-encryption

Author keywords

Cloud computing; Conditional proxy re encryption; Fine grained encryption; User revocation

Indexed keywords

CLOUD COMPUTING;

EID: 84936984467     PISSN: 15741192     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.pmcj.2015.06.017     Document Type: Article
Times cited : (87)

References (41)
  • 1
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • LNCS
    • M. Blaze, G. Bleumer, and M. Strauss Divertible protocols and atomic proxy cryptography Advances in Cryptology-Eurocrypt'98 LNCS vol. 1403 1998 127 144 10.1007/BFb0054122
    • (1998) Advances in Cryptology-Eurocrypt'98 , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 2
    • 58549086614 scopus 로고    scopus 로고
    • Type-based proxy re-encryption and its construction
    • Q. Tang, Type-based proxy re-encryption and its construction, in: Indocrypt'08, 2008, pp. 130-144. http://dx.doi.org/10.1007/978-3-540-89754-5-11.
    • (2008) Indocrypt'08 , pp. 130-144
    • Tang, Q.1
  • 3
    • 77952320634 scopus 로고    scopus 로고
    • Conditional proxy re-encryption secure against chosen-ciphertext attack
    • J. Weng, R.H. Deng, X. Ding, C.-K. Chu, J. Lai, Conditional proxy re-encryption secure against chosen-ciphertext attack, in: ASIACCS'09, 2009, pp. 322-332. http://dx.doi.org/10.1145/1533057.1533100.
    • (2009) ASIACCS'09 , pp. 322-332
    • Weng, J.1    Deng, R.H.2    Ding, X.3    Chu, C.-K.4    Lai, J.5
  • 5
    • 84968708831 scopus 로고    scopus 로고
    • European network and information security agency: Cloud computing risk assessment November
    • European network and information security agency: Cloud computing risk assessment, November 2009. http://www.enisa.europa.eu/act/rm/-les/deliverables/cloud-computing-risk-assessment.
    • (2009)
  • 7
  • 11
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger Improved proxy re-encryption schemes with applications to secure distributed storage ACM Trans. Inf. Syst. Secur. (TISSEC) 9 1 2006 1 30 10.1145/1127345.1127346
    • (2006) ACM Trans. Inf. Syst. Secur. (TISSEC) , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 12
    • 77952361637 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption
    • R. Canetti, S. Hohenberger, Chosen-ciphertext secure proxy re-encryption, in: ACM CCS 2007, 2007, pp. 185-194. http://dx.doi.org/10.1145/1315245.1315269.
    • (2007) ACM CCS 2007 , pp. 185-194
    • Canetti, R.1    Hohenberger, S.2
  • 13
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy re-encryption
    • LNCS
    • B. Libert, and D. Vergnaud Unidirectional chosen-ciphertext secure proxy re-encryption PKC'08 LNCS vol. 4929 2008 360 379 10.1007/978-3-540-78440-1-21
    • (2008) PKC'08 , vol.4929 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2
  • 15
    • 58449122500 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption without pairings
    • R.H. Deng, J. Weng, S. Liu, K. Chen, Chosen-ciphertext secure proxy re-encryption without pairings, in: CANS 2008, 2008, pp. 1-17. http://dx.doi.org/10.1007/978-3-540-89641-8-1.
    • (2008) CANS 2008 , pp. 1-17
    • Deng, R.H.1    Weng, J.2    Liu, S.3    Chen, K.4
  • 16
    • 67049100266 scopus 로고    scopus 로고
    • Cca-secure proxy re-encryption without pairings
    • LNCS
    • J. Shao, and Z. Cao Cca-secure proxy re-encryption without pairings PKC'09 LNCS vol. 5443 2009 357 376 10.1007/978-3-642-00468-1-20
    • (2009) PKC'09 , vol.5443 , pp. 357-376
    • Shao, J.1    Cao, Z.2
  • 18
    • 77952362084 scopus 로고    scopus 로고
    • Attribute-based proxy ee-encrytpion with delegating capabilities
    • X. Liang, Z. Cao, H. Lin, J. Shao, Attribute-based proxy ee-encrytpion with delegating capabilities, in: ACM ASIACCS'09, 2009, pp. 276-286. http://dx.doi.org/10.1145/1533057.1533094.
    • (2009) ACM ASIACCS'09 , pp. 276-286
    • Liang, X.1    Cao, Z.2    Lin, H.3    Shao, J.4
  • 20
    • 84919491069 scopus 로고    scopus 로고
    • A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
    • K. Liang, et al. A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing, Future Gener. Comput. Syst. http://dx.doi.org/10.1016/j.future.2014.11.016, in press.
    • Future Gener. Comput. Syst
    • Liang, K.1
  • 21
    • 84928213141 scopus 로고    scopus 로고
    • A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds
    • K. Liang, L. Fang, D.S. Wong, and W. Susilo A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds Concurr. Comput.: Pract. Exper. 27 8 2015 2004 2027 10.1002/cpe.3397
    • (2015) Concurr. Comput.: Pract. Exper. , vol.27 , Issue.8 , pp. 2004-2027
    • Liang, K.1    Fang, L.2    Wong, D.S.3    Susilo, W.4
  • 22
    • 84942521953 scopus 로고    scopus 로고
    • Outsourcing the re-encryption key generation: Flexible ciphertext-policy attribute-based proxy re-encryption
    • Y. Kawai, Outsourcing the re-encryption key generation: Flexible ciphertext-policy attribute-based proxy re-encryption, in: International Conference on Information Security Practice and Experience, ISPEC'15, 2015, pp. 301-315. http://dx.doi.org/10.1007/978-3-319-17533-1-21.
    • (2015) International Conference on Information Security Practice and Experience, ISPEC'15 , pp. 301-315
    • Kawai, Y.1
  • 23
    • 84865465739 scopus 로고    scopus 로고
    • Dynamic credentials and ciphertext delegation for attribute-based encryption
    • LNCS
    • A. Sahai, H. Seyalioglu, and B. Waters Dynamic credentials and ciphertext delegation for attribute-based encryption Crypto'12 LNCS vol. 7417 2012 199 217 10.1007/978-3-642-32009-5-13
    • (2012) Crypto'12 , vol.7417 , pp. 199-217
    • Sahai, A.1    Seyalioglu, H.2    Waters, B.3
  • 24
    • 79551617997 scopus 로고    scopus 로고
    • Attribute-based conditional proxy re-encryption with chosen-ciphertext security
    • J. Zhao, D. Feng, Z. Zhang, Attribute-based conditional proxy re-encryption with chosen-ciphertext security, in: IEEE GLOBECOM 2010, 2010, pp. 1-6. http://dx.doi.org/10.1109/GLOCOM.2010.5684045.
    • (2010) IEEE GLOBECOM 2010 , pp. 1-6
    • Zhao, J.1    Feng, D.2    Zhang, Z.3
  • 25
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • LNCS
    • R. Canetti, S. Halevi, and J. Katz Chosen-ciphertext security from identity-based encryption Advances in Cryptology-Eurocrypt'04 LNCS vol. 3027 2004 207 222 10.1007/978-3-540-24676-3-13
    • (2004) Advances in Cryptology-Eurocrypt'04 , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 26
    • 0000561923 scopus 로고    scopus 로고
    • Secure integration of asymmetric and symmetric encryption schemes
    • LNCS
    • E. Fujisaki, and T. Okamoto Secure integration of asymmetric and symmetric encryption schemes Advances in Cryptology-Crypto'09 LNCS vol. 1666 1999 80 101 10.1007/s00145-011-9114-1
    • (1999) Advances in Cryptology-Crypto'09 , vol.1666 , pp. 80-101
    • Fujisaki, E.1    Okamoto, T.2
  • 27
    • 84863280137 scopus 로고    scopus 로고
    • Generic construction of chosen ciphertext secure proxy re-encryption
    • G. Hanaoka, Y. Kawai, N. Kunihiro, T. Matsuda, J. Weng, R. Zhang, Y. Zhao, Generic construction of chosen ciphertext secure proxy re-encryption, in: CT-RSA'12, 2012, pp. 349-364. http://dx.doi.org/10.1007/978-3-642-27954-6-22.
    • (2012) CT-RSA'12 , pp. 349-364
    • Hanaoka, G.1    Kawai, Y.2    Kunihiro, N.3    Matsuda, T.4    Weng, J.5    Zhang, R.6    Zhao, Y.7
  • 28
    • 84942550160 scopus 로고    scopus 로고
    • Lower bounds for discrete logarithms and related problems
    • V. Shoup, Lower bounds for discrete logarithms and related problems, in: Advances in Cryptology-Eurocrypt'97, 1997, pp. 256-266. http://dx.doi.org/10.1007/3-540-69053-0-18.
    • (1997) Advances in Cryptology-Eurocrypt'97 , pp. 256-266
    • Shoup, V.1
  • 29
    • 84976779342 scopus 로고
    • Fast probabilistic algorithms for verification of polynomial identities
    • J. Schwartz Fast probabilistic algorithms for verification of polynomial identities J. ACM 27 4 1980 701 717 10.1145/322217.322225
    • (1980) J. ACM , vol.27 , Issue.4 , pp. 701-717
    • Schwartz, J.1
  • 31
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
    • B. Waters, Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization, in: PKC'11, 2011, pp. 53-70. http://dx.doi.org/10.1007/978-3-642-19379-8-4.
    • (2011) PKC'11 , pp. 53-70
    • Waters, B.1
  • 32
    • 74049120601 scopus 로고    scopus 로고
    • Attribute-based encryption with non-monotonic access structures
    • R. Ostrovsky, A. Sahai, B. Waters, Attribute-based encryption with non-monotonic access structures, in: ACM CCS'07, 2007, pp. 195-203. http://dx.doi.org/10.1145/1315245.1315270.
    • (2007) ACM CCS'07 , pp. 195-203
    • Ostrovsky, R.1    Sahai, A.2    Waters, B.3
  • 33
    • 44449129423 scopus 로고    scopus 로고
    • Predicate encryption supporting disjunctions, polynomial equations, and inner products
    • LNCS
    • J. Katz, A. Sahai, and B. Waters Predicate encryption supporting disjunctions, polynomial equations, and inner products Advances in Cryptology-Eurocrypt'08 LNCS vol. 4965 2008 146 162 10.1007/s00145-012-9119-4
    • (2008) Advances in Cryptology-Eurocrypt'08 , vol.4965 , pp. 146-162
    • Katz, J.1    Sahai, A.2    Waters, B.3
  • 34
    • 79953230454 scopus 로고    scopus 로고
    • Functional encryption: Definitions and challenges
    • D. Boneh, A. Sahai, B. Waters, Functional encryption: Definitions and challenges, in: Theory of Cryptography Conference, TCC'11, 2011, pp. 253-273. http://dx.doi.org/10.1007/978-3-642-19571-6-16.
    • (2011) Theory of Cryptography Conference, TCC'11 , pp. 253-273
    • Boneh, D.1    Sahai, A.2    Waters, B.3
  • 35
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure funtional encryption: Attibute-based encryption and (hierarchial) inner product encryption
    • LNCS
    • A. Lewko, T. Okamoto, A. Sahai, T. Takashima, and B. Waters Fully secure funtional encryption: Attibute-based encryption and (hierarchial) inner product encryption Advances in Cryptology-Eurocrypt'10 LNCS vol. 6110 2010 62 91 10.1007/978-3-642-13190-5-4
    • (2010) Advances in Cryptology-Eurocrypt'10 , vol.6110 , pp. 62-91
    • Lewko, A.1    Okamoto, T.2    Sahai, A.3    Takashima, T.4    Waters, B.5
  • 36
    • 72449201970 scopus 로고    scopus 로고
    • Attribute-based encryption supporting direct/indirect revocation modes
    • N. Attrapadung, H. Imai, Attribute-based encryption supporting direct/indirect revocation modes, in: IMA International Conference on Cryptography and Coding, 2009, pp. 278-300. http://dx.doi.org/10.1007/978-3-642-10868-6-17.
    • (2009) IMA International Conference on Cryptography and Coding , pp. 278-300
    • Attrapadung, N.1    Imai, H.2
  • 37
    • 78649998200 scopus 로고    scopus 로고
    • Hierarhical attribute-based encryption for fine-grained access control in cloud storage services
    • G. Wang, Q. Liu, J. Wu, Hierarhical attribute-based encryption for fine-grained access control in cloud storage services, in: ACM CCS'10, 2010, pp. 735-737. http://dx.doi.org/10.1145/1866307.1866414.
    • (2010) ACM CCS'10 , pp. 735-737
    • Wang, G.1    Liu, Q.2    Wu, J.3
  • 38
    • 77953310709 scopus 로고    scopus 로고
    • Achieving secure, scalable, and fine-grained data access control in cloud computing
    • S. Yu, C. Wang, K. Ren, W. Lou, Achieving secure, scalable, and fine-grained data access control in cloud computing, in: IEEE INFOCOM'10, 2010, pp. 1-9. http://dx.doi.org/10.1109/INFCOM.2010.5462174.
    • (2010) IEEE INFOCOM'10 , pp. 1-9
    • Yu, S.1    Wang, C.2    Ren, K.3    Lou, W.4
  • 39
    • 85084163661 scopus 로고    scopus 로고
    • A method for fast revocation of public key certificates and security capabilities
    • D. Boneh, X. Ding, G. Tsudik, C. Wong, A method for fast revocation of public key certificates and security capabilities, in: USENIX Security, 2001.
    • (2001) USENIX Security
    • Boneh, D.1    Ding, X.2    Tsudik, G.3    Wong, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.