Obfuscation for multi‐use re‐encryption and its application in cloud computing

With the rapid development of cloud computing, more and more data are being centralized into cloud server for sharing. It is a challenge problem on how to keep them both private and accessible. Re‐encryption function is a useful tool to fulfill secure cloud computing. Cloud data owners store their encrypted data on the cloud server. When other cloud users want to share the cloud data, cloud server can re‐encrypt the encrypted data for them. So data on the cloud server can be both accessible and private. Secure obfuscation for re‐encryption function can hide all the private information in the re‐encryption function, so the obfuscated program can be directly outsourced to cloud server without leaking anything about the computation task. In this paper, we study on secure obfuscation for three kinds of new re‐encryption functions: multi‐use re‐encryption, conditional re‐encryption with keyword search, and broadcast re‐encryption. We utilize the obfuscated results as tools to fulfill secure cloud computing. Cloud‐computing schemes based on obfuscation have better security compared with other tools. Copyright © 2014 John Wiley & Sons, Ltd.

[1]  Nir Bitansky,et al.  On Strong Simulation and Composable Point Obfuscation , 2010, Journal of Cryptology.

[2]  Yuval Ishai,et al.  Founding Cryptography on Tamper-Proof Hardware Tokens , 2010, IACR Cryptol. ePrint Arch..

[3]  Sabela Ramos,et al.  General‐purpose computation on GPUs for high performance cloud computing , 2013, Concurr. Comput. Pract. Exp..

[4]  Ryo Nishimaki,et al.  Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES , 2013, Des. Codes Cryptogr..

[5]  W. Erik Anderson,et al.  On the Secure Obfuscation of Deterministic Finite Automata , 2008, IACR Cryptol. ePrint Arch..

[6]  Craig Gentry,et al.  Candidate Multilinear Maps from Ideal Lattices , 2013, EUROCRYPT.

[7]  Guy N. Rothblum,et al.  On Best-Possible Obfuscation , 2007, Journal of Cryptology.

[8]  Andreas Polze,et al.  Trends and challenges in operating systems—from parallel computing to cloud computing , 2012, Concurr. Comput. Pract. Exp..

[9]  Jean-Sébastien Coron,et al.  Practical Multilinear Maps over the Integers , 2013, CRYPTO.

[10]  Ran Canetti,et al.  Obfuscating Point Functions with Multibit Output , 2008, EUROCRYPT.

[11]  Ran Canetti,et al.  Obfuscation of Hyperplane Membership , 2010, TCC.

[12]  Ran Canetti,et al.  Non-malleable Obfuscation , 2009, TCC.

[13]  Amit Sahai,et al.  Positive Results and Techniques for Obfuscation , 2004, EUROCRYPT.

[14]  Dennis Hofheinz,et al.  Obfuscation for Cryptographic Purposes , 2007, Journal of Cryptology.

[15]  Hai Jin,et al.  Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing , 2010, Concurr. Comput. Pract. Exp..

[16]  Yael Tauman Kalai,et al.  On Symmetric Encryption and Point Obfuscation , 2010, TCC.

[17]  Hai Jin,et al.  Building dynamic and transparent integrity measurement and protection for virtualized platform in cloud computing , 2010 .

[18]  Nico Döttling,et al.  Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions , 2011, IACR Cryptol. ePrint Arch..

[19]  WuJie,et al.  Achieving fine-grained access control for secure data sharing on cloud servers , 2011 .

[20]  Jin Li,et al.  Efficient Fair Conditional Payments for Outsourcing Computations , 2012, IEEE Transactions on Information Forensics and Security.

[21]  Amit Sahai,et al.  On the (im)possibility of obfuscating programs , 2001, JACM.

[22]  Abhi Shelat,et al.  Securely Obfuscating Re-Encryption , 2007, Journal of Cryptology.

[23]  Hoeteck Wee,et al.  On obfuscating point functions , 2005, STOC '05.

[24]  Rafail Ostrovsky,et al.  Public Key Encryption with Keyword Search , 2004, EUROCRYPT.

[25]  Xuyun Zhang,et al.  SaC‐FRAPP: a scalable and cost‐effective framework for privacy preservation over big data on cloud , 2013, Concurr. Comput. Pract. Exp..

[26]  Hui Li,et al.  A fine‐grained access control and revocation scheme on clouds , 2016, Concurr. Comput. Pract. Exp..

[27]  Satoshi Hada,et al.  Secure Obfuscation for Encrypted Signatures , 2010, EUROCRYPT.

[28]  Jin Li,et al.  Enabling efficient and secure data sharing in cloud computing , 2014, Concurr. Comput. Pract. Exp..

[29]  Ran Canetti,et al.  Towards Realizing Random Oracles: Hash Functions That Hide All Partial Information , 1997, CRYPTO.

[30]  Jianfeng Ma,et al.  New Algorithms for Secure Outsourcing of Modular Exponentiations , 2012, IEEE Transactions on Parallel and Distributed Systems.

[31]  Jie Wu,et al.  Achieving fine‐grained access control for secure data sharing on cloud servers , 2011, Concurr. Comput. Pract. Exp..