Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing
Abstract
:1. Introduction
1.1. Background
1.2. Our Contribution
- This paper introduces the PCBPRE+ scheme, which combines the properties of PPRE and CBPRE+ schemes. The proposed scheme improves computational efficiency by eliminating the reliance on bilinear pairs, effectively addressing the issue of high computation overhead present in existing schemes. As a result, the PCBPRE+ scheme is highly suitable for deployment on computationally or power-constrained devices.
- The scheme presented in this paper effectively addresses the challenges related to certificate management and key escrow in traditional CBPRE schemes. Additionally, it incorporates non-transferable and message-level fine-grained control features. Through fine-grained data control and permission management, the scheme ensures that only authorized users can access the data, thereby preventing unauthorized information leakage and tampering.
- This paper offers a formal conceptual description of the PCBPRE+ scheme, along with a defined security model. We designed a concrete PCBPRE+ scheme and rigorously verified and analyzed its correctness, security, and performance. Detailed empirical evidence and evaluation demonstrate the feasibility and practicality of the scheme.
1.3. Organization
2. Related Work
3. Preliminary
3.1. Elliptic Curve Group and Computational Assumption
- Addition: If , then mod p, where .
- Multiplication: If , then mod p, where .
- Inversion: If a is a non-zero element in , then the inverse of a is the only element that satisfies mod p.
3.2. Program Definition
- Setup (k): Given the security parameter k as input, the algorithm outputs the system’s public parameter and the master key .
- KeyGen (): Given the system’s public parameter as input, the algorithm generates and outputs the user’s private key and partial public key .
- Certify (): Given the system’s public parameter , master key , user identity , and partial public key as input, the algorithm generates and outputs all public keys and user certificate .
- Encrypt (): Given the ephemeral randomness , message m, user identity , public key , and the system’s public parameter as input, the algorithm creates and outputs the message’s original ciphertext .
- ReKeyGen (): Given the ephemeral randomness , the private key of user A, certificate , Identity of authorized user B, public key , and the system’s public parameter as input, the encryption key is created and output by the algorithm.
- ReEncrypt (): Given the original ciphertext , the re-encryption key , and the system’s public parameter as input, the algorithm outputs the re-encryption ciphertext .
- Decrypt1 (): Given the system’s public parameter , the private key of the authorizer, the certificate and the original ciphertext as input, the algorithm outputs either the message m or the invalid symbol ⊥.
- Decrypt2 (): Given the system’s public parameter , the private key of the authorized party, the certificate , and the original ciphertext as input, the algorithm outputs either the message m or the invalid symbol ⊥.
4. Security Model
4.1. Game IND-CCA2-I
- System parameter setting: The challenger executes the algorithm to generate the system’s public parameter set , with corresponding to master key . The challenger outputs the master key and outputs the system parameter set to adversary .
- Phase 1: Adversary is able to make the following inquiries in an adaptive manner.
- Users generation oracle: The challenger keeps track of the user’s private key, public key, and certificate in a table called that is initially empty. Adversary inputs the identity , and if there is already a record in table , the challenger outputs the public key to adversary ; otherwise, the challenger generates the public key , private key , and certificate corresponding to the identity , records them in , and outputs the public key to .
- Private key generation oracle: Adversary enters the identity , and the challenger extracts the private key from the table and outputs it to the .
- Certificate generation oracle: Certificate Inquiry: Adversary enters the identity , and the challenger obtains the certificate from table and outputs it to .
- Re-encryption key generation oracle: Adversary inputs the identity , randomly selects ephemeral randomness , and the challenger generates a re-encryption key , and outputs the re-encryption key to adversary .
- Re-encryption oracle: Adversary inputs an original ciphertext and the identity, and the challenger generates a re-encrypted ciphertext , and outputs the re-encrypted ciphertext to adversary .
- Decryption oracle: Adversary inputs identity and a ciphertext , and the challenger performs the decryption algorithm on and outputs the resulting value to .
- Challenge stage: After the Stage 1 inquiries, adversary produces an identity and two plaintexts of equal length, denoted as , . The restriction is that adversary has not made an inquiry about the certificate corresponding to the identity . The challenger randomly chooses , runs the algorithm to generate the original ciphertext of , and outputs it as the challenge ciphertext to , where does not interrogate the re-encryption key for .
- Phase 2: The same as the phase 1 interrogation, with the following restrictions: adversary cannot interrogate the certificate of the challenging identity ; for any , adversary cannot make an inquiry about the with the re-encryption key; adversary cannot interrogate the and the with the decryption key, and in the process, interrogates the output of the for the re-encryption.
- Guess: Adversary outputs a guess for . If , then adversary wins the game. The advantage for adversary to win is .
4.2. Game IND-CCA2-II
- System parameter setting: The challenger executes the algorithm to generate the system’s public parameter , with corresponding to the master key . The challenger outputs the master key and outputs the system parameter set to adversary .
- Phase 1: Adversary is able to make the following inquiries in an adaptive manner.
- 1.
- Users generation oracle: The challenger keeps track of the user’s private key, public key, and certificate in a table called that is initially empty. Adversary inputs the identity , and if there is already a record in table , the challenger outputs the public key to adversary ; otherwise, the challenger generates the public key , private key , and certificate corresponding to the identity , records them in , and outputs the public key to .
- 2.
- Private key generation oracle: Adversary enters the identity , and the challenger obtains the private key from the table and outputs it to .
- 3.
- Re-encryption key generation oracle: Adversary inputs the identity , randomly selects ephemeral randomness , and the challenger generates a re-encryption key , and outputs the re-encryption key to adversary .
- 4.
- Re-encryption oracle: Adversary inputs an original ciphertext , and identity , and the challenger generates a re-encrypted ciphertext , and outputs the re-encrypted ciphertext to adversary .
- 5.
- Decryption oracle: Adversary inputs identity and a ciphertext , and the challenger performs the decryption algorithm on and outputs the resulting value to .
- Challenge stage: Following the Stage 1 inquiries, adversary produces an identity along with two plaintexts of equal length, denoted as and . The restriction is that adversary has not asked for the private key corresponding to identity . The challenger randomly chooses , runs the algorithm to generate the original ciphertext of , and outputs it as the challenge ciphertext to , where does not interrogate the re-encryption key for .
- Phase 2: The same as the phase 1 interrogation, with the following restrictions: Adversary cannot ask for the private key of the challenge identity ; for any , adversary cannot inquiry the with the re-encryption key; adversary cannot interrogate the and the with the decryption key, and in the process, the interrogates the output of the for the re-encryption.
- Guess: Adversary outputs a guess for . If , then adversary wins the game. The advantage for adversary to win is .
5. Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme
- Setup: On inputting security parameters k, generate the master key and the set of public parameters as follows:
- (a)
- The k-bit prime q is chosen to produce a cyclic additive group, where group G comprises elliptic curves whose order is the large prime q and P is the generating element of G.
- (b)
- Choose five hash functions, where n and l denote the length of the random bit string used by the plaintext and encryption algorithms, respectively:
- (c)
- CA randomly selects , calculates , and outputs the master key and the set of public parameters:.
- KeyGen: On inputting public parameters , this algorithm randomly selects as the user i private key and computes the partial public key . Output user i’s private keys and partial public key .
- Certify: On inputting public parameter , master key , identity , and the partial public key .
- (a)
- The algorithm randomly selects , user i’s public key .
- (b)
- The algorithm calculates user i’s certificate
- Encrypt: On inputting message , identity , the public key , and public parameter , the user does the following:
- (a)
- Choose ephemeral randomness at random.
- (b)
- Randomly select a l-bit , and calculate , .
- (c)
- Computer the ciphertext , , , , where , .
- (d)
- Randomly select , and compute the ciphertext , .
- (e)
- Output the original ciphertext .
- ReKeyGen: On inputting ephemeral randomness c, public parameter , identity , certificate , the public key of sender A, and the identity and public key of receiver B, this algorithm performs as follows:
- (a)
- Calculate , where .
- (b)
- Then, compute , , .
- (c)
- Set the proxy re-encryption key .
- ReEncrypt: On inputting a re-encryption key , ciphertext C, and public parameter , the steps that the proxy takes are as follows:
- (a)
- If , then continue; otherwise, output ⊥.
- (b)
- Compute , , , , and output a new ciphertext .
- Decrypt1: On inputting ciphertext C, identity , private keys , the certificate of sender A, and public parameter , the receiver A operates as follows:
- (a)
- If , then proceed; if not, output ⊥.
- (b)
- Compute .
- (c)
- If , where , the algorithm returns m as the message. Otherwise, it outputs ⊥, indicating a failure or invalid condition.
- Decrypt2: On inputting ciphertext , identity , the public key of sender A and identity , private keys , the certificate of receiver B, and public parameter , the receiver B operates as follows:
- (a)
- Compute .
- (b)
- Compute .
- (c)
- If , where , the algorithm returns m as the message. Otherwise, it outputs ⊥, indicating a failure or invalid condition.
6. Security Analysis
6.1. Correctness Analysis
6.2. Security Analysis
- System parameter setting: The algorithm probabilistically selects an index value , and outputs to adversary as an open parameter set .
- Hash Oracle Queries: Adversary generates a random prophecy query, algorithm maintains table , where is initially empty, and algorithm interacts with adversary as follows:
- –
- Queries: Adversary inputs , if table already has records , algorithm outputs to adversary ; otherwise, algorithm randomly selects , records into , and outputs to adversary .
- –
- Queries: Adversary inputs , if table already has records , algorithm outputs to adversary ; otherwise, algorithm randomly selects , records into , and outputs to adversary .
- –
- Queries: Adversary inputs R, if table already has records , algorithm outputs to adversary ; otherwise, algorithm randomly selects , records into , and outputs to adversary .
- –
- Queries: Adversary inputs , if table already has records , algorithm outputs to adversary ; otherwise, algorithm randomly selects , records into , and outputs to adversary .
- –
- Queries: Adversary inputs , if table already has records , algorithm outputs to adversary ; otherwise, algorithm randomly selects , records into , and outputs to adversary .
- Phase 1: Adversary adaptively makes the following queries, and the algorithm maintains the table below as initially empty.
- User generation query: Adversary enters :
- (1)
- If there is already a record in table , algorithm outputs to adversary .
- (2)
- If is the user identity asked by adversary , that is, , the algorithm randomly selects , records into table , and outputs to adversary .
- (3)
- If , algorithm randomly select , let , add and to table and table , respectively, and output to adversary .
- Private key generation query: Adversary inputs , algorithm obtains the records from table , and outputs to adversary .
- Certificate generation query: Adversary inputs , if , Algorithm stops the game; otherwise, Algorithm obtains the records from Table and outputs to Adversary .
- Re-encryption key generation query: Adversary inputs , if , algorithm aborts the game; otherwise, algorithm obtains ephemeral randomness c, certificate , and public key , executes algorithm to produce a new re-encryption key , which is then output to adversary .
- Re-encryption query: Adversary inputs , Algorithm first verifies the equation . If the equation does not hold, Algorithm rejects the query; if it does, Algorithm executes as follows:
- (1)
- If , then algorithm searches the table for the record satisfying , where , . If there is no such record, the algorithm rejects the query; if it exists, then , , , . where . Algorithm outputs to adversary .
- (2)
- If , algorithm undergoes a re-encryption key query on to obtain , then outputs to adversary .
- Decryption query: Adversary inputs , and the algorithm is executed as follows:
- (1)
- If , is an original ciphertext, Algorithm checks , if the query is not valid, Algorithm rejects the query; otherwise, algorithm searches the table for records that satisfy , where , . If there is no such record, Algorithm rejects the query; if it exists, it outputs m to adversary as the decryption of ciphertext .
- (2)
- If , is a re-encrypted ciphertext, the algorithm performs the re-encryption key interrogation to obtain the re-encryption key , and computes . Algorithm searches the table for records that satisfy , where , . If there is no such record, algorithm rejects the query; if it exists, it outputs m to adversary as the decryption of ciphertext .
- (3)
- If , the algorithm obtains and , decrypts using the appropriate decryption algorithm, then outputs m to adversary .
- Challenge: After phase 1 queries, adversary outputs identity and two plaintexts of equal length . Adversary does not make a re-encryption key query for . If , the algorithm terminates the game, resulting in a failed simulation; otherwise, the algorithm probabilistically selects a value , calculates , records in table , and gives to as the challenge ciphertext. Obviously, holds.Decrypt :
- Phase 2: The algorithm answers the same as the phase 1 interrogation with the following constraints: adversary cannot interrogate the certificate of challenge identity ; for any , no re-encryption key interrogation can be performed on ; no decryption interrogation can be performed on and . The result of the re-encryption query is during the procedure.
- Guess: Adversary outputs a guess for . If , then wins the game.During the challenge, if adversary chooses the identity as the challenge identity, which is , then Algorithm does not abort the game. Algorithm selects a random record in table and uses as the solution to the given CDH problem.
- (1)
- : Adversary makes a random oracle query on .
- (2)
- : Adversary makes a random oracle query on .
- (3)
- : During the simulation, stops the game.
- (4)
- : rejects a legitimate re-encryption query.
- (5)
- : rejects a legitimate decryption query.
- System parameter setting: The algorithm randomly selects an index value ,, master private key , and outputs public parameters and master private key to adversary .
- Phase 1: Adversary adaptively makes the following queries, and the algorithm maintains the table below as initially empty.
- User generation query: Adversary inputs :
- (1)
- If there is already a record in table , algorithm outputs to adversary .
- (2)
- If is the user identity asked by adversary , that is, , the algorithm randomly selects , Record and into table and table , respectively, and output to adversary .
- (3)
- If , algorithm randomly select , let , add and to table and table , respectively, and output to adversary .
- Private key generation query: Adversary inputs , if , algorithm aborts the game; otherwise, algorithm obtains the records from table and outputs to adversary .
- Certificate generation query: Adversary inputs , if , Algorithm stops the game; otherwise, Algorithm obtains the records from Table and outputs to Adversary .
- Re-encryption key generation query: Adversary inputs , if , algorithm aborts the game; otherwise, algorithm obtains ephemeral randomness c, certificate and public key , executes algorithm to produce a new re-encryption key , which is then output to adversary .
- Re-encryption query: Adversary inputs , Algorithm first verifies the equation . If the equation does not hold, Algorithm rejects the query; if it does, Algorithm executes as follows:
- (1)
- If , the algorithm searches the table for the record satisfying , where , . If there is no such record, the algorithm rejects the query; if it exists, then , , , . where . Algorithm output to adversary .
- (2)
- If , algorithm does re-encryption key query on to obtain , then output to adversary .
- Decryption query: Adversary inputs , and the algorithm is executed as follows:
- (1)
- If , is an original ciphertext, Algorithm checks , if the query is not valid, Algorithm rejects the query; otherwise, algorithm searches the table for records that satisfy , where , . If there is no such record, Algorithm rejects the query; if it exists, it outputs m to adversary as the decryption of ciphertext .
- (2)
- If , is a re-encrypted ciphertext, the algorithm performs the re-encryption key interrogation to obtain the re-encryption key , and computes . Algorithm searches the table for records that satisfy , where , . If there is no such record, algorithm rejects the query; if it exists, it outputs m to adversary as the decryption of ciphertext .
- (3)
- If , the algorithm obtains and , decrypts using the appropriate decryption algorithm, then outputs m to adversary .
- Challenge: After phase 1 queries, adversary outputs identity and two plaintexts of equal length . Adversary does not make re-encryption key query for . If , the algorithm terminates the game, resulting in a failed simulation; otherwise, the algorithm probabilistically selects a value , calculates , records in table , and gives to as the challenge ciphertext. Obviously, holds.Decrypt :
- Phase 2: The algorithm answers the same as the phase 1 interrogation with the following constraints: adversary cannot interrogate the private key of challenge identity ; for any , no re-encryption key interrogation can be performed on ; no decryption interrogation can be performed on and . The result of the re-encryption query is during the procedure.
- Guess: Adversary produces a guess for . If , then wins the game.During the challenge, if adversary chooses the identity as the challenge identity, which is , then Algorithm does not abort the game. Algorithm selects a random record in table and uses as the solution to the given CDH problem.
7. Performance Analysis
7.1. Property Analysis
- Improved Efficiency: In contrast to the predominant proxy re-encryption schemes relying on bilinear pairings, our study introduces a bilinear pair-free approach employing elliptic curves for construction. This innovative methodology substantially diminishes the computational overhead, amplifies efficiency, and elevates the scalability of the scheme in comparison to prevailing methods. Noteworthy is the adaptability of our scheme, especially in scenarios involving power-constrained devices, rendering it highly applicable across diverse settings.
- Fine-Grained Message-Level Delegation: In our scheme, fine-grained control at the message level is attained via the utilization of ephemeral random values. This distinctive feature bestows upon the authorizer the ability to encrypt specific data intended for sharing, utilizing the same ephemeral random value, while employing distinct values for encrypting other messages. Through the strategic selection of diverse ephemeral random values, the authorizer acquires meticulous control over data access, facilitating the nuanced and selective sharing of information. This heightened level of flexibility and precision empowers users to authorize and share data with the utmost accuracy, finely tailored to their specific needs.
- Non-Transferability Guarantee: Our PCBPRE+ scheme integrates ephemeral randomness, the message, and the sender’s public key in the computation and generation of the re-encryption key. This approach guarantees complete independence among sender A, receiver B, and proxy P, preventing any collusion between P and B to deduce the ephemeral random value generated by A. Consequently, authorized users are unable to transfer their decryption privileges to others, ensuring data security and maintaining ownership control. This robust protection mechanism prevents authorized users from transferring their decryption rights to unauthorized parties, thus mitigating unauthorized data dissemination and misuse. By upholding the independence of decryption rights, our scheme enhances data protection and control, fostering secure and accountable data sharing.
- Enhanced Functionality: Our proxy re-encryption scheme, founded on certificate-based encryption (CBE), presents notable advancements compared to conventional public-key proxy re-encryption. By harnessing the advantageous properties inherent in CBE, we adeptly tackle the challenge associated with certificate revocation. Moreover, our scheme proficiently eradicates both the key escrow and distribution challenges inherent in identity-based proxy re-encryption, thereby augmenting its functionality and applicability.
- Re-encryption Control Capability: In our scheme, the cryptographer encrypts the original ciphertext by generating unique ephemeral random values for each message. This strategy guarantees the resilience of the original ciphertext decryption, even in scenarios where the encryption algorithm fails to produce a corresponding random number for the message. However, this also signifies that decrypting the re-encrypted ciphertext becomes impractical, granting the encryptor full control over the re-encryption process.
7.2. Efficiency Analysis
7.3. Application Analysis
8. Conclusions
Author Contributions
Funding
Data Availability Statement
Conflicts of Interest
References
- Blaze, M.; Bleumer, G.; Strauss, M. Divertible protocols and atomic proxy cryptography. In Proceedings of the Advances in Cryptology—EUROCRYPT’98: International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, 31 May–4 June 1998; Springer: Berlin/Heidelberg, Germany, 1998; pp. 127–144. [Google Scholar]
- Kim, S.; Lee, I. IoT device security based on proxy re-encryption. J. Ambient. Intell. Humaniz. Comput. 2018, 9, 1267–1273. [Google Scholar] [CrossRef]
- Ge, C.; Susilo, W.; Baek, J.; Liu, Z.; Xia, J.; Fang, L. A verifiable and fair attribute-based proxy re-encryption scheme for data sharing in clouds. IEEE Trans. Dependable Secur. Comput. 2021, 19, 2907–2919. [Google Scholar] [CrossRef]
- Yao, S.; Dayot, R.V.J.; Kim, H.J.; Ra, I.H. A novel revocable and identity-based conditional proxy re-encryption scheme with ciphertext evolution for secure cloud data sharing. IEEE Access 2021, 9, 42801–42816. [Google Scholar] [CrossRef]
- Kan, J.; Zhang, J.; Liu, D.; Huang, X. Proxy re-encryption scheme for decentralized storage networks. Appl. Sci. 2022, 12, 4260. [Google Scholar] [CrossRef]
- Susilo, W.; Dutta, P.; Duong, D.H.; Roy, P.S. Lattice-based HRA-secure attribute-based proxy re-encryption in standard model. In Proceedings of the Computer Security–ESORICS 2021: 26th European Symposium on Research in Computer Security, Darmstadt, Germany, 4–8 October 2021; Proceedings, Part II 26. Springer: Berlin/Heidelberg, Germany, 2021; pp. 169–191. [Google Scholar]
- Ateniese, G.; Fu, K.; Green, M.; Hohenberger, S. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 2006, 9, 1–30. [Google Scholar] [CrossRef]
- Canetti, R.; Hohenberger, S. Chosen-ciphertext secure proxy re-encryption. In Proceedings of the 14th ACM Conference on Computer and Communications Security, Alexandria, VA, USA, 2 November–31 October 2007; pp. 185–194. [Google Scholar]
- Libert, B.; Vergnaud, D. Unidirectional chosen-ciphertext secure proxy re-encryption. In Proceedings of the Public Key Cryptography—PKC 2008: 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, 9–12 March 2008; Springer: Berlin/Heidelberg, Germany, 2008; pp. 360–379. [Google Scholar]
- Shao, J.; Cao, Z. CCA-secure proxy re-encryption without pairings. In Proceedings of the Public Key Cryptography—PKC 2009: 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, 18–20 March 2009; Springer: Berlin/Heidelberg, Germany, 2009; pp. 357–376. [Google Scholar]
- Armbrust, M.; Fox, A.; Griffith, R.; Joseph, A.D.; Katz, R.; Konwinski, A.; Lee, G.; Patterson, D.; Rabkin, A.; Stoica, I.; et al. A view of cloud computing. Commun. ACM 2010, 53, 50–58. [Google Scholar] [CrossRef]
- Han, J.; Susilo, W.; Mu, Y. Identity-based data storage in cloud computing. Future Gener. Comput. Syst. 2013, 29, 673–681. [Google Scholar] [CrossRef]
- Luo, S.; Shen, Q.; Chen, Z. Fully secure unidirectional identity-based proxy re-encryption. In Proceedings of the Information Security and Cryptology-ICISC 2011: 14th International Conference, Seoul, Korea, 30 November–2 December 2011; Revised Selected Papers 14. Springer: Berlin/Heidelberg, Germany, 2012; pp. 109–126. [Google Scholar]
- Liang, K.; Chu, C.K.; Tan, X.; Wong, D.S.; Tang, C.; Zhou, J. Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts. Theor. Comput. Sci. 2014, 539, 87–105. [Google Scholar] [CrossRef]
- Sur, C.; Jung, C.D.; Park, Y.; Rhee, K.H. Chosen-ciphertext secure certificateless proxy re-encryption. In Proceedings of the Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International Conference, CMS 2010, Linz, Austria, 31 May–2 June 2010; Springer: Berlin/Heidelberg, Germany, 2010; pp. 214–232. [Google Scholar]
- Xu, L.; Wu, X.; Zhang, X. CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. In Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, Seoul, Republic of Korea, 2–4 May 2012; pp. 87–88. [Google Scholar]
- Wang, L.L.; Chen, K.F.; Mao, X.P.; Wang, Y.T. Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing. J. Shanghai Jiaotong Univ. (Sci.) 2014, 19, 398–405. [Google Scholar] [CrossRef]
- Sur, C.; Park, Y.; Shin, S.U.; Rhee, K.H.; Seo, C. Certificate-based proxy re-encryption for public cloud storage. In Proceedings of the 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, Taichung, Taiwan, 3–5 July 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 159–166. [Google Scholar]
- Xu, J.; Chen, K.; Shen, Z.; Xu, X. Pairing-free certificate-based multi-domain conditional proxy re-encryption scheme. J. Cryptologic Res. 2018, 5, 55–67. [Google Scholar]
- Tian, J.; Lu, Y.; Wang, F.; Yu, X. Efficient Multi-receiver Certificate-Based Proxy Re-encryption Scheme for Secure Cloud Data Sharing. In Proceedings of the Advances in Artificial Intelligence and Security: 7th International Conference, ICAIS 2021, Dublin, Ireland, 19–23 July 2021; Proceedings, Part II 7. Springer: Berlin/Heidelberg, Germany, 2021; pp. 593–605. [Google Scholar]
- Li, J.; Zhao, X.; Zhang, Y.; Yao, W. Provably Secure Certificate-based Conditional Proxy Re-encryption. J. Inf. Sci. Eng. 2016, 32, 813. [Google Scholar]
- Liu, S.; Qin, H.; Taniar, D.; Liu, W.; Li, Y.; Zhang, J. A certificate-based proxy re-encryption plus scheme for secure medical data sharing. Internet Things 2023, 23, 100836. [Google Scholar] [CrossRef]
- Wang, X.A.; Xhafa, F.; Ma, J.; Zheng, Z. Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme. J. Parallel Distrib. Comput. 2019, 130, 153–165. [Google Scholar] [CrossRef]
- Singh, K.; Rangan, C.P.; Sheshank, S.; Agrawal, R. Lattice-based unidirectional Proxy Re-Encryption and Proxy Re-Encryption+ schemes. IET Inf. Secur. 2021, 15, 1–12. [Google Scholar] [CrossRef]
- Singh, K.; Rangan, C.P.; Agrawal, R.; Sheshank, S. Provably secure lattice based identity based unidirectional PRE and PRE+ schemes. J. Inf. Secur. Appl. 2020, 54, 102569. [Google Scholar] [CrossRef]
- Wang, X.A.; Ge, Y.; Yang, X. PRE+: Dual of proxy re-encryption and its application. Cryptol. ePrint Arch. 2013, 2013, 872. [Google Scholar]
- Wang, X.A.; Xhafa, F.; Ma, J.; Barolli, L.; Ge, Y. PRE+: Dual of proxy re-encryption for secure cloud data sharing service. Int. J. Web Grid Serv. 2018, 14, 44–69. [Google Scholar] [CrossRef]
- Lu, Y.; Li, J. A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. Future Gener. Comput. Syst. 2016, 62, 140–147. [Google Scholar] [CrossRef]
- Boyen, X. The BB1 Identity-Based Cryptosystem: A Standard for Encryption and Key Encapsulation; IEEE P1363.3; Identity-Based Public Key Cryptocraphy; IEEE: Piscataway, NJ, USA, 2006. [Google Scholar]
Scheme | Sur [18] | Li [21] | Kan [5] | Liu [22] | Xu [19] | Ours |
---|---|---|---|---|---|---|
Pairing-free | No | No | No | No | Yes | Yes |
Conditional | No | Yes | No | Yes | Yes | Yes |
Complexity assumption | BDH | BDH | CDH | BDH | CDH | CDH |
Non-transferable delegation | No | No | Yes | Yes | No | Yes |
Solve the key distribution problem | Yes | Yes | No | Yes | Yes | Yes |
Fine-grained delegation (message level) | No | No | No | Yes | No | Yes |
Re-encryption authority of the encryptor | No | No | Yes | Yes | No | Yes |
Scheme | Encrypt | ReKeyGen | ReEncrypt | Decrypt1 | Decrypt2 |
---|---|---|---|---|---|
Sur [18] | 2P + 2E + 3M | 2P + 2E + 3M | 8P | 2P + E + 2M | 4P + E + M |
Li [21] | 3P + 2E + 3M | 2P + E + 5M | 5P | 4P + 2E | 4P + E + M |
Liu [22] | 3P + 2E + 4M | 2P + 2E + 2M | 6P | 2P + E + M | 4P + E + M |
Xu [19] | 5M | 5M | 3M | 4M | 5M |
Ours | 5M | 2M | 5M | 4M | 4M |
Process | Encrypt | ReKeyGen | ReEncrypt | Decrypt1 | Decrypt2 |
---|---|---|---|---|---|
Calculation volume | 5M + 4H | 2M + 2H | 5M + H | 4M + 3H | 4M + 4H |
Curves | ||||
---|---|---|---|---|
MNT/80 | 150 | 36 | 1 | 1 |
SS/80 | 20 | 4 | 1 | 1 |
Scheme | Encrypt | ReKeyGen | ReEncrypt | Decrypt1 | Decrypt2 |
---|---|---|---|---|---|
Sur [18] | 375 | 375 | 1200 | 338 | 637 |
Li [21] | 525 | 341 | 750 | 602 | 637 |
Liu [22] | 526 | 374 | 900 | 337 | 637 |
Xu [19] | 5 | 5 | 3 | 4 | 5 |
Ours | 5 | 2 | 5 | 4 | 4 |
Scheme | Encrypt | ReKeyGen | ReEncrypt | Decrypt1 | Decrypt2 |
---|---|---|---|---|---|
Sur [18] | 51 | 51 | 160 | 46 | 85 |
Li [21] | 71 | 49 | 100 | 82 | 85 |
Liu [22] | 72 | 50 | 120 | 45 | 85 |
Xu [19] | 5 | 5 | 3 | 4 | 5 |
Ours | 5 | 2 | 5 | 4 | 4 |
Symbol | Operation | Time Cost (ms) |
---|---|---|
Bilinear pairing | 11.571 | |
Exponential operation in group | 6.469 | |
Multiplicative operation in group G | 3.690 | |
Hash to points operation | 4.017 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Yan, L.; Qin, H.; Yang, K.; Xie, H.; Wang, X.A.; Liu, S. Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing. Electronics 2024, 13, 534. https://doi.org/10.3390/electronics13030534
Yan L, Qin H, Yang K, Xie H, Wang XA, Liu S. Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing. Electronics. 2024; 13(3):534. https://doi.org/10.3390/electronics13030534
Chicago/Turabian StyleYan, Lu, Haozhe Qin, Kexin Yang, Heye Xie, Xu An Wang, and Shuanggen Liu. 2024. "Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing" Electronics 13, no. 3: 534. https://doi.org/10.3390/electronics13030534
APA StyleYan, L., Qin, H., Yang, K., Xie, H., Wang, X. A., & Liu, S. (2024). Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing. Electronics, 13(3), 534. https://doi.org/10.3390/electronics13030534