An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing
journal contribution
posted on 2024-11-16, 09:12authored byKaitai Liang, J K Liu, Duncan Wong, Willy SusiloWilly Susilo
Identity-based encryption (IBE) eliminates the necessity of having a costly certificate verification process. However, revocation remains as a daunting task in terms of ciphertext update and key update phases. In this paper, we provide an affirmative solution to solve the efficiency problem incurred by revocation. We propose the first cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation but also delegation of decryption rights. No matter a user is revoked or not, at the end of a given time period the cloud acting as a proxy will re-encrypt all ciphertexts of the user under the current time period to the next time period. If the user is revoked in the forthcoming time period, he cannot decrypt the ciphertexts by using the expired private key anymore. comparing to some naive solutions which require a private key generator (PKG) to interact with non-revoked users in each time period, the new scheme provides definite advantages in terms of communication and computation efficiency. 2014 Springer International Publishing Switzerland.
Funding
Practical unified framework for secure e-consent mechanism for health records
Liang, K., Liu, J. K., Wong, D. S. & Susilo, W. (2014). An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. Lecture Notes in Computer Science, 8712 (PART 1), 257-272.
Journal title
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)