Asymmetric cross-cryptosystem re-encryption applicable to efficient and secure mobile access to outsourced data



Publication Details

Deng, H., Wu, Q., Qin, B., Susilo, W., Liu, J. & Shi, W. (2015). Asymmetric cross-cryptosystem re-encryption applicable to efficient and secure mobile access to outsourced data. In J. Zhou & G. Ahn (Eds.), Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security (ASIA CCS '15) (pp. 393-404). United States: ACM.


With the increasing development of pervasive computing and wireless bandwidth communication, more mobile devices are used to access sensitive data stored in remote servers. In such applications, a practical issue emerges such as how to exploit the sufficient resource of a server so that the file owners can enforce fine-grained access control over the remotely stored files, while enable resource-limited mobile devices to easily access the protected data, especially if the storage server maintained by a third party is untrusted. This challenge mainly arises from the asymmetric capacity among the participants, i.e., the capacity limited mobile devices and the resource abundant server (and file owners equipped with fixed computers). To meet the security requirements in mobile access to sensitive data, we propose a new encryption paradigm, referred to as asymmetric cross-cryptosystem re-encryption (ACCRE) by leveraging the asymmetric capacity of the participants. In ACCRE, relatively light-weight identity-based encryption (IBE) is deployed in mobile devices, while resource-consuming but versatile identity-based broadcast encryption (IBBE) is deployed in servers and fixed computers of the file owners. The core of ACCRE is a novel ciphertext conversion mechanism that allows an authorized proxy to convert a complicated IBBE ciphertext into a simple IBE ciphertext affordable to mobile devices, without leaking any sensitive information to the proxy. Following this paradigm, we propose an efficient ACCRE scheme with its security formally reduced to the security of the underly- ing IBE and IBBE schemes. Thorough theoretical analyses and extensive experiments confrm that the scheme takes very small cost for mobile devices to access encrypted data and is practical to secure mobile computing applications.

Please refer to publisher version or contact your library.



Link to publisher version (DOI)