On the security of a cloud-based revocable IBPRE scheme for data sharing

0Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In ESORICS2014, Liang et al. proposed an efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing, aimed at both supporting user revocation and delegation of decryption rights. The main strategy is to let the cloud periodic re-encrypt ciphertexts under the current time period to the next time period. If the user is revoked in the forth coming time period, he cannot decrypt the ciphertexts by using the expired private key anymore. Compared with traditional revocation technique by using PKG, this method has the advantage of computation and communication efficiency. However, in this paper we show an attack which allow the revoked user can decrypt the ciphertexts under the future time period, if the revoked users colludes with the proxy. Although cloud-based revocable identity based proxy re-encryption is a great idea for public cloud storage sharing, it needs further research before this scheme can be practically adapted.

Cite

CITATION STYLE

APA

Zhang, J., & Wang, B. (2017). On the security of a cloud-based revocable IBPRE scheme for data sharing. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 1, pp. 405–413). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-319-49109-7_38

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free