Efficient Proxy Re-encryption with Private Searching in the Untrusted Cloud

Автор: Xi Chen, Yong Li

Журнал: International Journal of Wireless and Microwave Technologies(IJWMT) @ijwmt

Статья в выпуске: 1 Vol.2, 2012 года.

Бесплатный доступ

As promising as cloud computing is, this paradigm brings forth new security and privacy challenges when operating in the untrusted cloud scenarios. In this paper, we propose a new cryptographic primitive Proxy Re-encryption with Private Searching (PRPS for short). The PRPS scheme enables the data users and owners efficiently query and access files storaged in untrusted cloud, while keeping query privacy and data privacy from the cloud providers. The concrete construction is based on proxy re-encryption, public key encryption with keyword search and the dual receiver cryptosystem. The scheme is semantically secure under the BDH assumption.

Еще

Public key encryption with keyword search, proxy re-encryption, untrusted cloud, private searching

Короткий адрес: https://sciup.org/15012788

IDR: 15012788

Список литературы Efficient Proxy Re-encryption with Private Searching in the Untrusted Cloud

  • M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. H. Katz, A. Konwinski, G. Lee, D. A. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, “Above the clouds: A berkeley view of cloud computing,” University of California, Berkeley, Tech. Rep. USB-EECS-2009-28, Feb 2009.
  • Shucheng Yu, Cong Wang, Kui Ren and Wenjing Lou, “Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing,” Proceedings of INFOCOM 2010. IEEE,2010.
  • G. Ateniese, K. Fu, M. Green, S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Transactions on Information and System Security (TISSEC). 9 (1) (2006) 1–30.
  • D. Boneh, G. Crescenzo, R. Ostrovsky, and G. Persiano, “Public Key Encryption with Keyword Search,” Proceedings of Eurocrypt 2004, LNCS 3027, Springer-Verlag. 2004. pp. 506-522.
  • T. Diament, H. K. Lee, A. D. Keromytis and M. Yung, “The Dual Receiver Cryptosystem and its Application,” Proceedings of the ACM CCS 2004, pp. 330-343.
  • Qin Liu, Guojun Wang, Jie Wu, “An Efficient Privacy Preserving Keyword Search Scheme in Cloud Computing,” CSE‟09,vol.2, 2009 , pp. 715 - 720.
  • J. Shao, Z. Cao, X. Liang, H. Lin, “Proxy re-encryption with keyword search,” Inf. Sci. 180 (2010) 2576–2587.
Еще
Статья научная