FileReCrypt: An Authenticated And Revocable Scheme For Personal File Sharing Using Cloud Storage

Personal Records such as Identity proofs, birth certificates, and qualification and experience certificates, social claim certificates are essential in numerous scenarios like applying for employment, education, and land and vehicle registration and so on. Cloud platform can be used for this purpose with a number of advantages such as storage-on-demand, robustness, access anywhere anytime from any device. At the same time, the cloud storage provider must ensure confidentiality, integrity, access control and authentication for the documents. Towards this end, an authenticated revocable symmetric proxy re-encryption scheme has been designed in the proposed work using All-Or-NOthing-Transform (AONT) and key homomorphic encryption (KHE) in the elliptic curve group setting. The implementation results show that the performance measures are acceptable for small storage requirements while achieving the security goals.

[1]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[2]  Steven Myers,et al.  Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation , 2017, IACR Cryptol. ePrint Arch..

[3]  K. Sakurai,et al.  Realizing Proxy Re-encryption in the Symmetric World , 2011 .

[4]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[5]  Douglas R. Stinson,et al.  Something About All or Nothing (Transforms) , 2001, Des. Codes Cryptogr..

[6]  V. Canda,et al.  A new mode of using all-or-nothing transforms , 2002, Proceedings IEEE International Symposium on Information Theory,.

[7]  Burton S. Kaliski,et al.  PKCS #7: Cryptographic Message Syntax Version 1.5 , 1998, RFC.

[8]  Angelos D. Keromytis,et al.  Conversion and proxy functions for symmetric key ciphers , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[9]  Ronald L. Rivest,et al.  All-or-Nothing Encryption and the Package Transform , 1997, FSE.

[10]  Yevgeniy Dodis,et al.  Proxy Cryptography Revisited , 2003, NDSS.

[11]  Ian Miers,et al.  Charm: a framework for rapidly prototyping cryptosystems , 2013, Journal of Cryptographic Engineering.

[12]  M. Mambo,et al.  Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security) , 1997 .

[13]  Markus Jakobsson,et al.  On Quorum Controlled Asymmetric Proxy Re-encryption , 1999, Public Key Cryptography.

[14]  Anand Desai,et al.  The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search , 2000, CRYPTO.