e-space
Manchester Metropolitan University's Research Repository

    Secure bidirectional proxy re-encryption for cryptographic cloud storage

    Shao, J, Lu, R, Lin, X and Liang, K (2016) Secure bidirectional proxy re-encryption for cryptographic cloud storage. Pervasive and Mobile Computing, 28. pp. 113-121. ISSN 1574-1192

    [img]
    Preview

    Available under License Creative Commons Attribution Non-commercial No Derivatives.

    Download (324kB) | Preview

    Abstract

    Bidirectional proxy re-encryption allows ciphertext transformation between Alice and Bob via a semi-trusted proxy, who however cannot obtain the corresponding plaintext. Due to this special property, bidirectional proxy re-encryption has become a flexible tool in many dynamic environments, such as cryptographic cloud storage. Nonetheless, how to design a secure and efficient bidirectional proxy re-encryption is still challenging. In this paper, we propose a new bidirectional proxy re-encryption scheme that holds the following properties: (1) constant ciphertext size no matter how many times the transformation is performed; (2) master secret security in the random oracle model, i.e., Alice (resp. Bob) colluding with the proxy cannot obtain Bob’s (resp. Alice’s) private key; (3) replayable chosen ciphertext (RCCA) security in the random oracle model. The above three properties are usually required in the cryptographic cloud storage. Furthermore, the proposed new master secret security may be of independent interest, as it is closer to the original desire: delegate the decryption rights while keeping the signing rights.

    Impact and Reach

    Statistics

    Activity Overview
    6 month trend
    503Downloads
    6 month trend
    256Hits

    Additional statistics for this dataset are available via IRStats2.

    Altmetric

    Actions (login required)

    View Item View Item