Identity Based Proxy Re-Encryption Scheme (IBPRE+) for Secure Cloud Data Sharing

In proxy re-encryption (PRE), a proxy with re-encryption keys can transfer aciphertext computed under Alice's public key into a new one, which can be decrypted by Bob only with his secret key. Recently, Wang et al. introduced the concept of PRE plus (PRE+) scheme, which can be seen as the dual of PRE, and is almost the same as PRE scheme except that the re-encryption keys are generated by the encrypter. Compared to PRE, PRE+ scheme can easily achieve two important properties: first, the message-level based fine-grained delegation and, second, the non-transferable property. In this paper, we extend the concept of PRE+ to the identity based setting. We propose a concrete IBPRE+ scheme based on 3-linear map and roughly discuss its properties. We also demonstrate potential application of this new primitive to secure cloud data sharing.

[1]  Fabrice Kordon,et al.  An approach for developing an interoperability mechanism between cloud providers , 2014, Int. J. Space Based Situated Comput..

[2]  Joseph K. Liu,et al.  A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing , 2014, IEEE Transactions on Information Forensics and Security.

[3]  Joseph K. Liu,et al.  An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing , 2014, ESORICS.

[4]  Eiji Okamoto,et al.  Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities , 2012 .

[5]  Qiong Huang,et al.  A Conditional Proxy Broadcast Re-Encryption Scheme Supporting Timed-Release , 2013, ISPEC.

[6]  Ying Wang,et al.  Degradation and encryption for outsourced PNG images in cloud storage , 2016, Int. J. Grid Util. Comput..

[7]  Yevgeniy Dodis,et al.  Proxy cryptography revisted , 2003 .

[8]  Xu An Wang,et al.  PRE+: Dual of Proxy Re-encryption and Its Application , 2013, IACR Cryptol. ePrint Arch..

[9]  Dong Hoon Lee,et al.  New Constructions of Revocable Identity-Based Encryption From Multilinear Maps , 2015, IEEE Transactions on Information Forensics and Security.

[10]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[11]  Elena Apostol,et al.  A solution for the management of multimedia sessions in hybrid clouds , 2014, Int. J. Space Based Situated Comput..

[12]  Chun-Ying Huang,et al.  Secure Multicast Using Proxy Encryption , 2005, ICICS.

[13]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[14]  Haixia Xu,et al.  A secure delegation scheme of large polynomial computation in multi-party cloud , 2015, Int. J. Grid Util. Comput..

[15]  Xiaoyuan Yang,et al.  Protecting data in cloud environment with attribute-based encryption , 2015, Int. J. Grid Util. Comput..

[16]  Yevgeniy Dodis,et al.  Proxy Cryptography Revisited , 2003, NDSS.

[17]  Yun Ling,et al.  Anonymous proxy re-encryption , 2012, Secur. Commun. Networks.