e-space
Manchester Metropolitan University's Research Repository

Secure bidirectional proxy re-encryption for cryptographic cloud storage

Shao, J and Lu, R and Lin, X and Liang, K (2016) Secure bidirectional proxy re-encryption for cryptographic cloud storage. Pervasive and Mobile Computing, 28. pp. 113-121. ISSN 1574-1192

[img]
Preview

Available under License Creative Commons Attribution Non-commercial No Derivatives.

Download (324kB) | Preview

Abstract

Bidirectional proxy re-encryption allows ciphertext transformation between Alice and Bob via a semi-trusted proxy, who however cannot obtain the corresponding plaintext. Due to this special property, bidirectional proxy re-encryption has become a flexible tool in many dynamic environments, such as cryptographic cloud storage. Nonetheless, how to design a secure and efficient bidirectional proxy re-encryption is still challenging. In this paper, we propose a new bidirectional proxy re-encryption scheme that holds the following properties: (1) constant ciphertext size no matter how many times the transformation is performed; (2) master secret security in the random oracle model, i.e., Alice (resp. Bob) colluding with the proxy cannot obtain Bob’s (resp. Alice’s) private key; (3) replayable chosen ciphertext (RCCA) security in the random oracle model. The above three properties are usually required in the cryptographic cloud storage. Furthermore, the proposed new master secret security may be of independent interest, as it is closer to the original desire: delegate the decryption rights while keeping the signing rights.

Impact and Reach

Statistics

Downloads
Activity Overview
272Downloads
144Hits

Additional statistics for this dataset are available via IRStats2.

Altmetric

Actions (login required)

Edit Item Edit Item