Skip to main content
Log in

A proxy broadcast re-encryption for cloud data sharing

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Proxy re-encryption (PRE) enables a semi-trusted proxy to automatically convert a delegator’s ciphertext to a delegate’s ciphertext without learning anything about the underlying plaintext. PRE schemes have broad applications, such as cloud data sharing systems, distributed file systems, email forward systems and DRM systems. In this paper, we introduced a new notion of proxy broadcast re-encryption (PBRE). In a PBRE scheme, a delegator, Alice, can delegate the decryption right to a set of users at a time, which means that Alice’s ciphertext can be broadcast re-encrypted. We propose a PBRE scheme and prove its security against a chosen-ciphertext attack (CCA) in the random oracle model under the decisional n-BDHE assumption. Furthermore, our scheme is collusion-resistant, which means the proxy cannot collude with a set of delegates to reveal the delegator’s private key.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Ateniese G, Fu K, Green M, Hohenberger S (2005) Improved proxy re-encryption schemes with applications to secure distributed storage. Proceedings of the 12th Annual Network and Distributed System Security Symposium 2005, San Diego, California, USA, 3-4 February. ACM, NewYork, pp 29–44

    Google Scholar 

  2. Blaze M, Bleumer G, Strauss M (1998) Divertible protocols and atomic proxy cryptography. Proceedings of EUROCRYPT 1998, Finland, 31 May 31 - 4 June. Springer-Verlag, Berlin, pp 127–144

    MATH  Google Scholar 

  3. Boneh D, Boyen X (2004) Efficient selective-ID based encryption without random oracles. Proceedings of EUROCRYPT 2004 Interlaken, Switzerland, 2-6 May. Springer-Verlag, Berlin, pp 223–238

    MATH  Google Scholar 

  4. Boneh D, Boyen X, Goh E (2005) Hierarchical identity based encryption with constant size ciphertext. Proceedings of Eurocrypt 2005, Aarhus, Denmarka, 22-26 May. Springer-Verlag, Berlin, pp 440– 456

    MATH  Google Scholar 

  5. Boneh D, Franklin M (2001) Identity-based encryption from the weil pairing. Proceedings of CRYPTO 2001, Santa Barbara, California, USA, 19-23 August. Springer-Verlag, Berlin, pp 231–229

    Google Scholar 

  6. Boneh D, Gentry C, Waters B (2005) Collusion Resisitant Broadcast Encryption wiht short Ciphertexts and Private Keys. Proceedings of Crypto 2005, Santa Barbara, California, USA, 14-18 Auguest. Springer-Verlag, Berlin, pp 258–275

    Google Scholar 

  7. Chow SM, Weng J, Yang YJ, Deng RH (2010) Efficient Unidirectional proxy re-encryption. Proceedings of AFRICACRYPT 2010, Stellenbosch, South Africa, 3-6 May. Springer-Verlag, Berlin, pp 316– 332

    Google Scholar 

  8. Deng RH, Weng J, Liu SL, Chen KF (2008) Chosen-ciphertext secure proxy re-encryption without pairings. Proceedings of CANS 2008, Tirgu Mures, USA, 8-9 November. Springer-Verlag, Berlin, pp 1–17

    Google Scholar 

  9. Fang L, Susilo W, Wang J (2009) Anonymous Conditional Proxy Re-encrypiton Without Random Oracle. Proceedings of ProcSec 2009, Guangzhou, China, 11-13 November, pp 47–60. LNCS

  10. Fang L, Wang J, Ge C, Ren Y (2012) Fuzzy conditional proxy re-encryption. Journal of Sci China Inf Sci 56:1–13

    Google Scholar 

  11. Libert B, Vergnaud D (2008) Unidirectional chosen-ciphertext secure proxy re-encryption. Proceedings of PKC 2008, Barcelona, Spain, 9-12 March. Springer-Verlag, Berlin, pp 360–379

    MATH  Google Scholar 

  12. Shao J, Chao ZF (2009) CCA-secure proxy re-encryption without pairings. Proceedings of PKC 2009, Irvine, CA, USA, 18-20 March, pp.357-376. LNCS

  13. Weng J, Chen M, Yang Y, DENG R, Chen K, Bao F (2010) CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Journal of Sci China Inf Sci 53:593–606

    Article  MathSciNet  Google Scholar 

  14. Weng J, Deng RH, Chu C (2009) Conditional proxy re-encryption secure against chosen-ciphertext attack. Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security 2009, Sydeny, Australia, 10-12 March. ACM, NewYork, pp 322– 332

    Google Scholar 

Download references

Acknowledgments

This paper is supported by the National Natural Science Foundation of China (No. 61672270, 61602216, 6127208, 61300236), the Research Foundation for Humanities and Social Sciences of Ministry of Education, China (No.14YJAZH023,15YJCZH129), the Qing Lan Project for Young Researchers of Jiangsu Province of China(No. KYQ14004),and the Open Fund of State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences (No. 2015-MSB-10), the National Science Foundation for Post-doctoral Scientists of China (No. 2013M530254), the National Science Foundation for Post-doctoral Scientists of Jiangsu (No. 1302137C), and the China Postdoctoral Science special Foundation (No. 2014T70518).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunpeng Ge.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sun, M., Ge, C., Fang, L. et al. A proxy broadcast re-encryption for cloud data sharing. Multimed Tools Appl 77, 10455–10469 (2018). https://doi.org/10.1007/s11042-017-4448-9

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-017-4448-9

Keywords

Navigation