CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud

Identity-based encryption (IBE) is a very attractive cryptographic primitive due to its unnecessity of any certificate managements. Nevertheless, the user revocation problem in IBE remains an elusive research problem and hence, it is an important research topic. One possible approach in achieving re...

Full description

Bibliographic Details
Main Authors: Yinxia Sun, Willy Susilo, Futai Zhang, Anmin Fu
Format: Article
Language:English
Published: IEEE 2018-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/8478287/
_version_ 1818643035620114432
author Yinxia Sun
Willy Susilo
Futai Zhang
Anmin Fu
author_facet Yinxia Sun
Willy Susilo
Futai Zhang
Anmin Fu
author_sort Yinxia Sun
collection DOAJ
description Identity-based encryption (IBE) is a very attractive cryptographic primitive due to its unnecessity of any certificate managements. Nevertheless, the user revocation problem in IBE remains an elusive research problem and hence, it is an important research topic. One possible approach in achieving revocations is to update user's decryption keys. However, to avoid the need of secret channels, public time keys need to be issued to allow this update to occur. It is unfortunate that this method often suffers from two problems: 1) the user has to maintain linearly growing decryption keys; and 2) the revoked users can still access ciphertexts prior to revocation. At the first glance, proxy re-encryption technique may provide a solution to this problem, but the ciphertexts will become longer after each re-encryption, which makes it impractical. In this paper, we present a revocable identity-based encryption scheme with cloud-aided ciphertext evolution. Our construction solves the two aforementioned problems via ciphertext evolution implemented by the cloud. In addition, the size of ciphertexts in the cloud remains constant size regardless of evolutions. The scheme is provably secure against chosen ciphertext attacks based on the BDH problem. The comparisons with the existing related works show that our scheme enjoys better efficiency, and thus it is practical for the data sharing in cloud storage.
first_indexed 2024-12-16T23:52:33Z
format Article
id doaj.art-820d46f36de24be8a4f855006bfe3c43
institution Directory Open Access Journal
issn 2169-3536
language English
last_indexed 2024-12-16T23:52:33Z
publishDate 2018-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj.art-820d46f36de24be8a4f855006bfe3c432022-12-21T22:11:17ZengIEEEIEEE Access2169-35362018-01-016569775698310.1109/ACCESS.2018.28730198478287CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the CloudYinxia Sun0https://orcid.org/0000-0001-6004-0985Willy Susilo1Futai Zhang2Anmin Fu3School of Computer Science and Technology, Nanjing Normal University, Nanjing, ChinaSchool of Computing and Information Technology, University of Wollongong, Wollongong, NSW, AustraliaSchool of Computer Science and Technology, Nanjing Normal University, Nanjing, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, ChinaIdentity-based encryption (IBE) is a very attractive cryptographic primitive due to its unnecessity of any certificate managements. Nevertheless, the user revocation problem in IBE remains an elusive research problem and hence, it is an important research topic. One possible approach in achieving revocations is to update user's decryption keys. However, to avoid the need of secret channels, public time keys need to be issued to allow this update to occur. It is unfortunate that this method often suffers from two problems: 1) the user has to maintain linearly growing decryption keys; and 2) the revoked users can still access ciphertexts prior to revocation. At the first glance, proxy re-encryption technique may provide a solution to this problem, but the ciphertexts will become longer after each re-encryption, which makes it impractical. In this paper, we present a revocable identity-based encryption scheme with cloud-aided ciphertext evolution. Our construction solves the two aforementioned problems via ciphertext evolution implemented by the cloud. In addition, the size of ciphertexts in the cloud remains constant size regardless of evolutions. The scheme is provably secure against chosen ciphertext attacks based on the BDH problem. The comparisons with the existing related works show that our scheme enjoys better efficiency, and thus it is practical for the data sharing in cloud storage.https://ieeexplore.ieee.org/document/8478287/CCAciphertext evolutioncloudidentity-based encryptionrevocable
spellingShingle Yinxia Sun
Willy Susilo
Futai Zhang
Anmin Fu
CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud
IEEE Access
CCA
ciphertext evolution
cloud
identity-based encryption
revocable
title CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud
title_full CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud
title_fullStr CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud
title_full_unstemmed CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud
title_short CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud
title_sort cca secure revocable identity based encryption with ciphertext evolution in the cloud
topic CCA
ciphertext evolution
cloud
identity-based encryption
revocable
url https://ieeexplore.ieee.org/document/8478287/
work_keys_str_mv AT yinxiasun ccasecurerevocableidentitybasedencryptionwithciphertextevolutioninthecloud
AT willysusilo ccasecurerevocableidentitybasedencryptionwithciphertextevolutioninthecloud
AT futaizhang ccasecurerevocableidentitybasedencryptionwithciphertextevolutioninthecloud
AT anminfu ccasecurerevocableidentitybasedencryptionwithciphertextevolutioninthecloud