CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud
Identity-based encryption (IBE) is a very attractive cryptographic primitive due to its unnecessity of any certificate managements. Nevertheless, the user revocation problem in IBE remains an elusive research problem and hence, it is an important research topic. One possible approach in achieving re...
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2018-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/8478287/ |
_version_ | 1818643035620114432 |
---|---|
author | Yinxia Sun Willy Susilo Futai Zhang Anmin Fu |
author_facet | Yinxia Sun Willy Susilo Futai Zhang Anmin Fu |
author_sort | Yinxia Sun |
collection | DOAJ |
description | Identity-based encryption (IBE) is a very attractive cryptographic primitive due to its unnecessity of any certificate managements. Nevertheless, the user revocation problem in IBE remains an elusive research problem and hence, it is an important research topic. One possible approach in achieving revocations is to update user's decryption keys. However, to avoid the need of secret channels, public time keys need to be issued to allow this update to occur. It is unfortunate that this method often suffers from two problems: 1) the user has to maintain linearly growing decryption keys; and 2) the revoked users can still access ciphertexts prior to revocation. At the first glance, proxy re-encryption technique may provide a solution to this problem, but the ciphertexts will become longer after each re-encryption, which makes it impractical. In this paper, we present a revocable identity-based encryption scheme with cloud-aided ciphertext evolution. Our construction solves the two aforementioned problems via ciphertext evolution implemented by the cloud. In addition, the size of ciphertexts in the cloud remains constant size regardless of evolutions. The scheme is provably secure against chosen ciphertext attacks based on the BDH problem. The comparisons with the existing related works show that our scheme enjoys better efficiency, and thus it is practical for the data sharing in cloud storage. |
first_indexed | 2024-12-16T23:52:33Z |
format | Article |
id | doaj.art-820d46f36de24be8a4f855006bfe3c43 |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-16T23:52:33Z |
publishDate | 2018-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-820d46f36de24be8a4f855006bfe3c432022-12-21T22:11:17ZengIEEEIEEE Access2169-35362018-01-016569775698310.1109/ACCESS.2018.28730198478287CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the CloudYinxia Sun0https://orcid.org/0000-0001-6004-0985Willy Susilo1Futai Zhang2Anmin Fu3School of Computer Science and Technology, Nanjing Normal University, Nanjing, ChinaSchool of Computing and Information Technology, University of Wollongong, Wollongong, NSW, AustraliaSchool of Computer Science and Technology, Nanjing Normal University, Nanjing, ChinaSchool of Computer Science and Engineering, Nanjing University of Science and Technology, Nanjing, ChinaIdentity-based encryption (IBE) is a very attractive cryptographic primitive due to its unnecessity of any certificate managements. Nevertheless, the user revocation problem in IBE remains an elusive research problem and hence, it is an important research topic. One possible approach in achieving revocations is to update user's decryption keys. However, to avoid the need of secret channels, public time keys need to be issued to allow this update to occur. It is unfortunate that this method often suffers from two problems: 1) the user has to maintain linearly growing decryption keys; and 2) the revoked users can still access ciphertexts prior to revocation. At the first glance, proxy re-encryption technique may provide a solution to this problem, but the ciphertexts will become longer after each re-encryption, which makes it impractical. In this paper, we present a revocable identity-based encryption scheme with cloud-aided ciphertext evolution. Our construction solves the two aforementioned problems via ciphertext evolution implemented by the cloud. In addition, the size of ciphertexts in the cloud remains constant size regardless of evolutions. The scheme is provably secure against chosen ciphertext attacks based on the BDH problem. The comparisons with the existing related works show that our scheme enjoys better efficiency, and thus it is practical for the data sharing in cloud storage.https://ieeexplore.ieee.org/document/8478287/CCAciphertext evolutioncloudidentity-based encryptionrevocable |
spellingShingle | Yinxia Sun Willy Susilo Futai Zhang Anmin Fu CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud IEEE Access CCA ciphertext evolution cloud identity-based encryption revocable |
title | CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud |
title_full | CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud |
title_fullStr | CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud |
title_full_unstemmed | CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud |
title_short | CCA-Secure Revocable Identity-Based Encryption With Ciphertext Evolution in the Cloud |
title_sort | cca secure revocable identity based encryption with ciphertext evolution in the cloud |
topic | CCA ciphertext evolution cloud identity-based encryption revocable |
url | https://ieeexplore.ieee.org/document/8478287/ |
work_keys_str_mv | AT yinxiasun ccasecurerevocableidentitybasedencryptionwithciphertextevolutioninthecloud AT willysusilo ccasecurerevocableidentitybasedencryptionwithciphertextevolutioninthecloud AT futaizhang ccasecurerevocableidentitybasedencryptionwithciphertextevolutioninthecloud AT anminfu ccasecurerevocableidentitybasedencryptionwithciphertextevolutioninthecloud |