Security of cloud-based revocable identity-based proxy re-encryption scheme

Seunghwan Park, Dong Hoon Lee

Research output: Contribution to journalArticle

Abstract

Designing secure revocable storage systems for a large number of users in a cloud-based environment is important. Cloud storage systems should allow its users to dynamically join and leave the storage service. Further, the rights of the users to access the data should be changed accordingly. Recently, Liang et al. proposed a cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation and delegation of decryption rights. Moreover, to reduce the size of the key update token, they employed a public key broadcast encryption system as a building block. In this paper, we show that the CR-IB-PRE scheme with the reduced key update token size is not secure against collusion attacks.

Original languageEnglish
Pages (from-to)1933-1936
Number of pages4
JournalIEICE Transactions on Information and Systems
VolumeE99D
Issue number7
DOIs
Publication statusPublished - 2016 Jul 1

Fingerprint

Cryptography

Keywords

  • Ciphertext update
  • Cloudbased identity-based proxy re-encryption
  • Key revocation
  • Revocable identity-based encryption

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Software
  • Artificial Intelligence
  • Hardware and Architecture
  • Computer Vision and Pattern Recognition

Cite this

Security of cloud-based revocable identity-based proxy re-encryption scheme. / Park, Seunghwan; Lee, Dong Hoon.

In: IEICE Transactions on Information and Systems, Vol. E99D, No. 7, 01.07.2016, p. 1933-1936.

Research output: Contribution to journalArticle

@article{803c1ca9bbdd4e33b860b10529d952b6,
title = "Security of cloud-based revocable identity-based proxy re-encryption scheme",
abstract = "Designing secure revocable storage systems for a large number of users in a cloud-based environment is important. Cloud storage systems should allow its users to dynamically join and leave the storage service. Further, the rights of the users to access the data should be changed accordingly. Recently, Liang et al. proposed a cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation and delegation of decryption rights. Moreover, to reduce the size of the key update token, they employed a public key broadcast encryption system as a building block. In this paper, we show that the CR-IB-PRE scheme with the reduced key update token size is not secure against collusion attacks.",
keywords = "Ciphertext update, Cloudbased identity-based proxy re-encryption, Key revocation, Revocable identity-based encryption",
author = "Seunghwan Park and Lee, {Dong Hoon}",
year = "2016",
month = "7",
day = "1",
doi = "10.1587/transinf.2016EDL8042",
language = "English",
volume = "E99D",
pages = "1933--1936",
journal = "IEICE Transactions on Information and Systems",
issn = "0916-8532",
publisher = "Maruzen Co., Ltd/Maruzen Kabushikikaisha",
number = "7",

}

TY - JOUR

T1 - Security of cloud-based revocable identity-based proxy re-encryption scheme

AU - Park, Seunghwan

AU - Lee, Dong Hoon

PY - 2016/7/1

Y1 - 2016/7/1

N2 - Designing secure revocable storage systems for a large number of users in a cloud-based environment is important. Cloud storage systems should allow its users to dynamically join and leave the storage service. Further, the rights of the users to access the data should be changed accordingly. Recently, Liang et al. proposed a cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation and delegation of decryption rights. Moreover, to reduce the size of the key update token, they employed a public key broadcast encryption system as a building block. In this paper, we show that the CR-IB-PRE scheme with the reduced key update token size is not secure against collusion attacks.

AB - Designing secure revocable storage systems for a large number of users in a cloud-based environment is important. Cloud storage systems should allow its users to dynamically join and leave the storage service. Further, the rights of the users to access the data should be changed accordingly. Recently, Liang et al. proposed a cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation and delegation of decryption rights. Moreover, to reduce the size of the key update token, they employed a public key broadcast encryption system as a building block. In this paper, we show that the CR-IB-PRE scheme with the reduced key update token size is not secure against collusion attacks.

KW - Ciphertext update

KW - Cloudbased identity-based proxy re-encryption

KW - Key revocation

KW - Revocable identity-based encryption

UR - http://www.scopus.com/inward/record.url?scp=84976892804&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84976892804&partnerID=8YFLogxK

U2 - 10.1587/transinf.2016EDL8042

DO - 10.1587/transinf.2016EDL8042

M3 - Article

VL - E99D

SP - 1933

EP - 1936

JO - IEICE Transactions on Information and Systems

JF - IEICE Transactions on Information and Systems

SN - 0916-8532

IS - 7

ER -