Visible to the public Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds

TitleEfficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds
Publication TypeConference Paper
Year of Publication2018
AuthorsChen, Wei-Hao, Fan, Chun-I, Tseng, Yi-Fan
Conference Name2018 IEEE Conference on Dependable and Secure Computing (DSC)
Date Publisheddec
ISBN Number978-1-5386-5790-4
KeywordsAccess Control, authorisation, cloud computing, cloud servers, composability, Computer science, conditional proxy re-encryption schemes, cryptography, Cyber physical system, cyber physical systems, efficient encryption, efficient key-aggregate proxy re-encryption, encrypted files, Encryption, key-aggregate approach, Key-Aggregate Cryptosystem, key-aggregate proxy re-encryption scheme, protecting sensitive files, Proxy re-encryption, pubcrawl, Public key, re-encryption keys, resilience, Resiliency, secure data sharing

Cloud computing undoubtedly is the most unparalleled technique in rapidly developing industries. Protecting sensitive files stored in the clouds from being accessed by malicious attackers is essential to the success of the clouds. In proxy re-encryption schemes, users delegate their encrypted files to other users by using re-encryption keys, which elegantly transfers the users' burden to the cloud servers. Moreover, one can adopt conditional proxy re-encryption schemes to employ their access control policy on the files to be shared. However, we recognize that the size of re-encryption keys will grow linearly with the number of the condition values, which may be impractical in low computational devices. In this paper, we combine a key-aggregate approach and a proxy re-encryption scheme into a key-aggregate proxy re-encryption scheme. It is worth mentioning that the proposed scheme is the first key-aggregate proxy re-encryption scheme. As a side note, the size of re-encryption keys is constant.

Citation Keychen_efficient_2018