Journal of shanghai Jiaotong University (Science) ›› 2014, Vol. 19 ›› Issue (4): 398-405.doi: 10.1007/s12204-014-1514-6
Previous Articles Next Articles
WANG Liang-liang1* (王亮亮), CHEN Ke-fei2 (陈克非),MAO Xian-ping1 (毛贤平), WANG Yong-tao3 (王永涛)
Online:
2014-08-30
Published:
2014-10-13
Contact:
WANG Liang-liang(王亮亮)
E-mail:liangliangwang@sjtu.edu.cn
CLC Number:
WANG Liang-liang1* (王亮亮), CHEN Ke-fei2 (陈克非),MAO Xian-ping1 (毛贤平), WANG Yong-tao3 (王永涛). Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing[J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 398-405.
[1] Chow R, Golle P, Jakobsson M, et al. Controlling data in the cloud: Outsourcing computation without outsourcing control [C]//Proceedings of the 2009 ACM workshop on cloud computing security. New York,USA: ACM, 2009: 85-90.[2] Kamara S, Lauter K. Cryptographic cloud storage[C]//Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security. Berlin,Germany: Springer-Verlag, 2010: 136-149.[3] Ryan M D. Cloud computing privacy concerns on our doorstep [J]. Communications of the ACM, 2011,54(1): 36-38.[4] Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography [J]. Lecture Notes in Computer Science, 1998, 1403: 127-144.[5] Golle P, Jakobsson M, Juels A, et al. Universal reencryption for mixnets [J]. Lecture Notes in Computer Science, 2004, 2964: 163-178.[6] Green M, Ateniese G. Identity-based proxy reencryption [C]//Proceedings of the 5th International Conference on Applied Cryptography and Netword Security.Berlin, Germany: Springer-Verlag, 2007: 288-306.[7] Chu C K, Tzeng W G. Identity-based proxy reencryption without random oracles [J]. Lecture Notes in Computer Science, 2007, 4779: 189-202.[8] Canetti R, Hohenberger S. Chosen-ciphertext secure proxy re-encryption [C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. New York, USA: ACM, 2007: 185-194.[9] Libert B, Vergnaud D. Unidirectional chosenciphertext secure proxy re-encryption [J]. Lecture Notes in Computer Science, 2008, 4939: 360-379.[10] Deng RH, Weng J, Liu S L, et al. Chosen-ciphertext secure proxy re-encryption without pairings [J]. Lecture Notes in Computer Science, 2008, 5339: 1-17.[11] Shao J, Cao Z F. CCA-secure proxy re-encryption without parings [J]. Lecture Notes in Computer Science,2009, 5443: 357-376.[12] Weng J, Deng R H, Liu S L, et al. Chosen-ciphertext secure bidirectional proxy re-encryption without parings[J]. Information Sciences, 2010, 180: 5077-5089.[13] Xu L, Wu X, Zhang X. CL-PRE: A certificateless proxy re-encryption scheme for secure data sharing with public cloud [C]//Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security. New York, USA: ACM, 2012: 87-88.[14] Sur C, Jung C D, Park Y, et al. Chosen-ciphertext secure certificateless proxy re-encryption [J]. Lecture Notes in Computer Science, 2010, 6109: 214-232.[15] Liu Q, Wang G J, Wu J. Time-based proxy reencryption scheme for secure data sharing in a cloud environment [J]. Information Sciences, 2012, 258:355-370.[16] Shamir A. Identity-based cryptosystems and signature schemes [J]. Lecture Notes in Computer Science,1985, 196: 47-53.[17] Guillou L C, Quisquater J-J. A “paradoxical” identity-based signature scheme resulting from zeroknowledge[J]. Lecture Notes in Computer Science,1990, 403: 216-231.[18] Paterson K G. ID-based signatures from pairings on elliptic curves [J]. Electronics Letters, 2002, 38(18):1025-1026.[19] Boneh D, Franklin M. Identity-based encryption from the weil pairing [J]. Lecture Notes in Computer Science, 2001, 2139: 213-229.[20] Choon J C, Cheon J H. An identity-based signature from gap diffie-hellman groups [J]. Lecture Notes in Computer Science, 2002, 2567: 18-30.[21] Chen X F, Zhang F G, Kim K. A new id-based group signature scheme from bilinear pairings [J]. Lecture Notes in Computer Science, 2003, 2908: 585-592.[22] Hess F. Efficient identity based signature schemes based on pairings [J]. Lecture Notes in Computer Science,2003, 2595: 310-324.[23] Yi X. An identity-based signature scheme from the weil pairing [J]. IEEE Communications Letters, 2003,7(2): 76-78.[24] Al-Riyami S S, Paterson K G. Certificateless public key cryptography [C]// Proceedings of 9th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology-Asiacrypt 2003. Berlin, Germany:Springer-Verlag, 2003: 452-473.[25] Baek J, Safavi-Naini R, Susilo W. Certificateless public key encryption without pairing [J]. Lecture Notes in Computer Science, 2005, 3650: 134-148. [26] Sun Y X, Zhang F T, Baek J. Strongly secure certificateless public key encryption without pairing [J].Lecture Notes in Computer Science, 2007, 4856: 194-208.[27] Yum D H, Lee P J. Generic construction of certificateless encryption [J]. Lecture Notes in Computer Science,2004, 3043: 802-811.[28] Libert B, Quisquater J-J. On construction certificateless cryptosystems from identity based encryption[J]. Lecture Notes in Computer Science, 2006, 3958:474-490.[29] Liu J K, Au M H, Susilo W. Self-generatedcertificate public key cryptography and certificateless signature/encryption scheme in the standard model [C]//Proceedings of the 2nd ACM Symposium on Information,Computer and Communications Security.New York, USA: ACM, 2007: 273-283.[30] Au M H, Mu Y, Chen J, et al. Malicious KGC attacks in certificateless cryptography [C]//Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. New York, USA:ACM, 2007: 302-311.[31] Chow S S M, Boyd C, Nieto J M G. Security-Mediated certificateless cryptography [J]. Lecture Notes in Computer Science, 2006, 3958: 508-524.[32] Barreto P S L M, Kim H Y, Lynn B, et al. Efficient algorithms for pairing-based cryptosystems [J]. Lecture Notes in Computer Science, 2002, 2442: 354-369.[33] Scott M. Computing the tate pairing [J]. Lecture Notes in Computer Science. 2005, 3376: 293-304.[34] Bao F, Deng R H, Zhu H F. Variations of diffiehellman problem [J]. Lecture Notes in Computer Science,2003, 2836: 301-312.[35] Boneh D, Boyen X. Short signatures without random oracles [J]. Lecture Notes in Computer Science, 2004,3027: 56-73.[36] Waters B. Efficient identity-based encryption without random oracles [C]//Proceedings of the 24th Annual International Conference on Theory and Applications of Cryptographic Techniques. Berlin, Germany:Springer-Verlag, 2005: 114-127. |
[1] | SU Mang (苏铓), WANG Liangchen (汪良辰), FU Anmin (付安民), YU Yan (俞研). Proxy Re-Encryption Based Multi-Factor Access Control for Ciphertext in Cloud [J]. Journal of Shanghai Jiao Tong University (Science), 2018, 23(5): 666-670. |
[2] | LI Jianhua. A Survey of New E-Government and Its Security Technologies [J]. Journal of Shanghai Jiaotong University, 2018, 52(10): 1370-1381. |
[3] | Jiantao SHI, Xiukun LI, Zhaoxin ZHANG. CloudStack Based Virtual Simulation Cloud Platform for Network Attack and Defense Experiment [J]. Research and Exploration in Laboratory, 2017, 36(5): 75-78. |
[4] | Xu WU, Renan CHEN, Dezhi WEI. Design and Application of Speech Lab under Cloud Computing [J]. Research and Exploration in Laboratory, 2017, 36(5): 239-242. |
[5] | LI Da-zhi1,2* (李大志), LIU Jian-hua3 (刘建华), DONG Xin1 (董鑫),LI Lu-qun2 (李鲁群), CHEN Jun-hua2 (陈军华). Application-Oriented Cloud Monitoring Data Distribution Mechanism [J]. Journal of shanghai Jiaotong University (Science), 2015, 20(2): 149-155. |
[6] | WANG Chih-hung* (王智弘), TU Tai-yuan (涂泰源). Keyword Search Encryption Scheme Resistant Against Keyword-Guessing Attack by the Untrusted Server [J]. Journal of shanghai Jiaotong University (Science), 2014, 19(4): 440-442. |
[7] | CHI Ziwena,b,ZHANG Fenga,b,DU Zhenhonga,b,LIU Renyia,b. Parallel Resampling Method of Remote Sensing Data Based on Pre-Partitioning for Cloud Computing [J]. Journal of Shanghai Jiaotong University, 2014, 48(11): 1627-1632. |
[8] | LU Hai-Jun, YU Xiu-Yuan, XIE Qi. Provably Secure Certificateless Aggregate Signature with Constant Length [J]. Journal of Shanghai Jiaotong University, 2012, 46(02): 259-263. |
[9] | CHEN Jian-hong (陈剑洪), LONG Yu (龙 宇), CHEN Ke-fei (陈克非) WANG Yong-tao (王永涛),LI Xiang-xue (李祥学). An Efficient Threshold Key-Insulated Signature Scheme [J]. Journal of shanghai Jiaotong University (Science), 2011, 16(6): 658-662. |
[10] | TSO Ray-lin (左瑞麟), KIM Cheonshik, YI Xun (易 训). Certificateless Message Recovery Signatures Providing Girault's Level-3 Security [J]. Journal of shanghai Jiaotong University (Science), 2011, 16(5): 577-585. |
[11] |
ZHANG Hai1,DONG Xiaolei1,CAO Zhenfu1,CAO Feng2.
(t, k, l)-Threshold Proxy Signature Without Random Oracle [J]. Journal of Shanghai Jiaotong University, 2010, 44(08): 1031-1036. |
[12] | MA Rong,CAO Zhenfu. An Efficient and Full Secure IdentityBased Encryption Scheme [J]. Journal of Shanghai Jiaotong University, 2010, 44(03): 389-0392. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||