Security of cloud-based revocable identity-based proxy re-encryption scheme

  • Seunghwan Park
  • , Dong Hoon Lee*
  • *Corresponding author for this work

    Research output: Contribution to journalArticlepeer-review

    1 Citation (Scopus)

    Abstract

    Designing secure revocable storage systems for a large number of users in a cloud-based environment is important. Cloud storage systems should allow its users to dynamically join and leave the storage service. Further, the rights of the users to access the data should be changed accordingly. Recently, Liang et al. proposed a cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation and delegation of decryption rights. Moreover, to reduce the size of the key update token, they employed a public key broadcast encryption system as a building block. In this paper, we show that the CR-IB-PRE scheme with the reduced key update token size is not secure against collusion attacks.

    Original languageEnglish
    Pages (from-to)1933-1936
    Number of pages4
    JournalIEICE Transactions on Information and Systems
    VolumeE99D
    Issue number7
    DOIs
    Publication statusPublished - 2016 Jul

    Bibliographical note

    Funding Information:
    This work was supported by Institute for Information &communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (No.R0126-16-1090,A study of a public-key authentication framework for internet entities with hierarchical identities). Dong Hoon Lee was supported by research grant funded by the Korea University.

    Publisher Copyright:
    © 2016 The Institute of Electronics, Information and Communication Engineers.

    Keywords

    • Ciphertext update
    • Cloudbased identity-based proxy re-encryption
    • Key revocation
    • Revocable identity-based encryption

    ASJC Scopus subject areas

    • Software
    • Hardware and Architecture
    • Computer Vision and Pattern Recognition
    • Electrical and Electronic Engineering
    • Artificial Intelligence

    Fingerprint

    Dive into the research topics of 'Security of cloud-based revocable identity-based proxy re-encryption scheme'. Together they form a unique fingerprint.

    Cite this