Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing

Xu An Wang1, 2, Xiaoyuan Yang1, Cong Li1, Yudong Liu1 and Yong Ding2

  1. Key Laboratory of Information and Network Security, Engineering University of Chinese Armed Police Force
    P. R. China
  2. Guangxi Key Laboratory of Cryptography and Information Security, Guilin University of Electronic Technology
    P. R. China
    wangxazjd@163.com, xyyangwj@126.com, wugongcong@163.com, 1269124170@qq.com, 284722748@qq.com

Abstract

Recently Liang et al. propose an interesting privacy-preserving ciphertext multi-sharing control for big data storage mechanism, which is based on the cryptographic primitive of anonymous multi-hop identity based conditional proxy re-encryption scheme AMH-IBCPRE. They propose a concrete AMH-IBCPRE scheme and conclude their scheme can achieve IND-sCon-sID-CCA secure (indistinguishable secure under selectively conditional selectively identity chosen ciphertext attack). However, our research show their scheme can not be IND-sConsID-CCA secure for single-hop and multi-hop data sharing. Also in 2014, Liang et al. propose an interesting deterministic finite automata-based functional proxy reencryption scheme DFA-based FPRE for secure public cloud data sharing, they also conclude their scheme can achieve IND-CCA secure (indistinguishable secure under chosen ciphertext attack), we also show their scheme can not be IND-CCA secure either. For these two proposals, the main reason of insecurity is that part of the re-encryption key has the same structure as the valid ciphertext, thus the adversary can query on the decryption oracle with this part of the re-encryption key to get secret keys, which will break the CCA-security of their scheme.We give an improved AMH-IBCPRE scheme and an improved DFA-based FPRE scheme for cloud data sharing and show the new schemes can resist our attack and be CCA-secure.We also demonstrate our improved AMH-IBCPRE scheme’s efficiency compared with other related identity based proxy re-encryption schemes, the results show our scheme is almost the most efficient one.

Key words

Attack, multi-control for big data storage, secure cloud data sharing, proxy re-encryption, chosen ciphertext security

Digital Object Identifier (DOI)

https://doi.org/10.2298/CSIS171218024W

Publication information

Volume 15, Issue 3 (October 2018)
Year of Publication: 2018
ISSN: 2406-1018 (Online)
Publisher: ComSIS Consortium

Full text

DownloadAvailable in PDF
Portable Document Format

How to cite

Wang, X. A., Yang, X., Li, C., Liu, Y., Ding, Y.: Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing. Computer Science and Information Systems, Vol. 15, No. 3, 585–614. (2018), https://doi.org/10.2298/CSIS171218024W