Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017, Article ID 2508693, 11 pages
https://doi.org/10.1155/2017/2508693
Research Article

Revocable Key-Aggregate Cryptosystem for Data Sharing in Cloud

Department of Computer Science, Jinan University, Guangzhou 510632, China

Correspondence should be addressed to Xiaoming Wang; nc.ude.unj@mxwt

Received 19 October 2016; Revised 7 February 2017; Accepted 20 February 2017; Published 12 March 2017

Academic Editor: Bruce M. Kapron

Copyright © 2017 Qingqing Gan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. J. Wu, L. Ping, X. Ge, W. Ya, and J. Fu, “Cloud storage as the infrastructure of Cloud Computing,” in Proceedings of the International Conference on Intelligent Computing and Cognitive Informatics (ICICCI '10), pp. 380–383, June 2010. View at Publisher · View at Google Scholar · View at Scopus
  2. K. Dahbur, B. Mohammad, and A. B. Tarakji, “Security issues in cloud computing: a survey of risks, threats and vulnerabilities,” Cloud Computing Advancements in Design Implementation & Technologies, vol. 1, no. 3, pp. 1–11, 2011. View at Google Scholar
  3. P. Sikhar, S. Yash, and M. Debdeep, “Dynamic key-aggregate cryptosystem on ellipticcurves for online data sharing,” IACR Cryptology ePrint Archive, vol. 2015, pp. 923–942, 2015. View at Google Scholar
  4. D. Naor, M. Naor, and J. Lotspiech, “Revocation and tracing schemes for stateless receivers,” in Advances in Cryptology—CRYPTO 2001. CRYPTO 2001, J. Kilian, Ed., vol. 2139 of Lecture Notes in Computer Science, pp. 41–62, Springer, Berlin, Germany, 2001. View at Publisher · View at Google Scholar
  5. S. Park, K. Lee, and D. H. Lee, “New constructions of revocable identity-based encryption from multilinear maps,” IEEE Transactions on Information Forensics & Security, vol. 10, no. 8, pp. 1564–1577, 2015. View at Publisher · View at Google Scholar · View at Scopus
  6. Y. Shi, Q. Zheng, J. Liu, and Z. Han, “Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation,” Information Sciences, vol. 295, pp. 221–231, 2015. View at Publisher · View at Google Scholar · View at MathSciNet
  7. S. G. Akl and P. D. Taylor, “Cryptographic solution to a problem of access control in a hierarchy,” ACM Transactions on Computer Systems (TOCS), vol. 1, no. 3, pp. 239–248, 1983. View at Publisher · View at Google Scholar · View at Scopus
  8. M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, “Dynamic and efficient key management for access hierarchies,” ACM Transactions on Information and System Security, vol. 12, no. 3, pp. 1–43, 2009. View at Publisher · View at Google Scholar · View at Scopus
  9. A. R. Pais and S. Joshi, “A new probabilistic rekeying method for secure multicast groups,” International Journal of Information Security, vol. 9, no. 4, pp. 275–286, 2010. View at Publisher · View at Google Scholar · View at Scopus
  10. G. Ateniese, A. De Santis, A. L. Ferrara, and B. Masucci, “Provably-secure time-bound hierarchical key assignment schemes,” Journal of Cryptology, vol. 25, no. 2, pp. 243–270, 2012. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  11. J. Benaloh, M. Chase, E. Horvitz, and K. Lauter, “Patient controlled encryption: ensuring privacy of electronic medical records,” in Proceedings of the ACM Workshop on Cloud Computing Security (CCSW '09), Co-located with the 16th ACM Computer and Communications Security Conference (CCS '09), pp. 103–114, Chicago, Ill, USA, November 2009. View at Publisher · View at Google Scholar · View at Scopus
  12. J. Benaloh, “Key compression and its application to digital fingerprinting,” Tech. Rep., Microsoft Research, 2009. View at Google Scholar
  13. B. Alomair and R. Poovendran, “Information theoretically secure encryption with almost free authentication,” Journal of Universal Computer Science, vol. 15, no. 15, pp. 2937–2956, 2009. View at Google Scholar · View at MathSciNet
  14. A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology, pp. 47–53, Springer, Berlin, Germany, 1984. View at Google Scholar
  15. D. Boneh and M. Franklin, “Identity-based encryption from the weil pairing,” in Proceedings of the Annual International Cryptology Conference (CRYPTO '01), vol. 44, no. 3 of Lecture Notes in Computer Science (LNCS), pp. 389–392, Santa Barbara, Calif, USA, 2001.
  16. F. Guo, Y. Mu, and Z. Chen, “Identity-based encryption: how to decrypt multiple Ciphertexts using a single decryption key,” in Proceedings of the Pairing-based Cryptography (Pairing '07), pp. 392–406, Springer, Berlin, Germany, 2007.
  17. F. Guo, Y. Mu, Z. Chen, and L. Xu, “Multi-identity single-key decryption without random oracles,” in Information security and cryptology, vol. 4990 of Lecture Notes in Comput. Sci., pp. 384–398, Springer, Berlin, Germany, 2008. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  18. Y. Ming, Y. Wang, and L. Pang, “Provably secure multi-identity single-key decryption scheme in the standard model,” Computer Science, vol. 37, no. 3, pp. 73–75, 2010. View at Google Scholar
  19. A. Sahai and B. Waters, “Fuzzy identity-based encryption,” in Advances in Cryptology—EUROCRYPT 2005, pp. 457–473, Springer, Berlin, Germany, 2005. View at Google Scholar
  20. B. Waters, “Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization,” in Public Key Cryptography—PKC 2011. PKC 2011, D. Catalano, N. Fazio, R. Gennaro, and A. Nicolosi, Eds., vol. 6571 of Lecture Notes in Computer Science, pp. 53–70, Springer, Berlin, Germany, 2011. View at Publisher · View at Google Scholar
  21. M. Li, S. Yu, Y. Zheng, K. Ren, and W. Lou, “Scalable and secure sharing of personal health records in cloud computing using attribute-based encryption,” IEEE Transactions on Parallel and Distributed Systems, vol. 24, no. 1, pp. 131–143, 2013. View at Publisher · View at Google Scholar · View at Scopus
  22. R. Canetti and S. Hohenberger, “Chosen-ciphertext secure proxy re-encryption,” in Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS '07), pp. 185–194, Alexandria, Va, USA, November 2007. View at Publisher · View at Google Scholar · View at Scopus
  23. C. Wu, S. Li, and Y. Zhang, “Key management scheme based on secret sharing for wireless sensor networks,” International Journal of Information and Communication Technology, vol. 7, no. 2-3, pp. 126–140, 2015. View at Publisher · View at Google Scholar · View at Scopus
  24. C.-K. Chu, S. S. M. Chow, W.-G. Tzeng, J. Zhou, and R. H. Deng, “Key-aggregate cryptosystem for scalable data sharing in cloud storage,” IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 468–477, 2014. View at Publisher · View at Google Scholar · View at Scopus
  25. K. Kate and S. D. Potdukhe, “Data sharing in cloud storage with key-aggregate cryptosystem,” International Journal of Engineering Research and General Science, vol. 2, no. 6, pp. 882–886, 2014. View at Google Scholar
  26. B. Cui, Z. Liu, and L. Wang, “Key-aggregate searchable encryption (KASE) for group data sharing via cloud storage,” Institute of Electrical and Electronics Engineers. Transactions on Computers, vol. 65, no. 8, pp. 2374–2385, 2016. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  27. H. Dang, Y. L. Chong, F. Brun et al., “Fine-grained sharing of encrypted sensor data over cloud storage with key aggregation,” IACR Cryptology ePrint Archive, pp. 739–750, 2015. View at Google Scholar
  28. Q. Gan and X. Wang, “An efficient key-aggregate encryption scheme under cloud environment,” Computer Engineering, vol. 42, no. 2, pp. 33–44, 2016. View at Google Scholar
  29. D. Boneh and A. Silverberg, “Applications of multilinear forms to cryptography,” in Contemporary Mathematics, vol. 324, pp. 71–90, 2003. View at Google Scholar
  30. D. Boneh, B. Waters, and M. Zhandry, “Low overhead broadcast encryption from multilinear maps,” in Advances in Cryptology—CRYPTO 2014, vol. 8616 of Lecture Notes in Comput. Sci., pp. 206–223, Springer, Heidelberg, Germany, 2014. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  31. R. Canetti, S. Halevi, and J. Katz, “Chosen-ciphertext security from identity-based encryption,” in Advances in cryptology—EUROCRYPT 2004, vol. 3027 of Lecture Notes in Comput. Sci., pp. 207–222, Springer, Berlin, Germany, 2004. View at Publisher · View at Google Scholar · View at MathSciNet