2021
DOI: 10.1109/access.2021.3064863
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Revocable and Identity-Based Conditional Proxy Re-Encryption Scheme With Ciphertext Evolution for Secure Cloud Data Sharing

Abstract: Proxy re-encryption (PRE), with the unique ciphertext transformation ability, enables various ciphertext authorization applications to be implemented efficiently. However, most existing PRE schemes mainly focus on access authorization while ignoring the situation where the key needs to be changed and the ciphertext needs to be evolved, making the scheme's practicability and security inadequate. Moreover, the few schemes that simultaneously combine ciphertext authorization, key update, and ciphertext evolution … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
4
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 20 publications
(14 citation statements)
references
References 25 publications
(78 reference statements)
0
4
0
1
Order By: Relevance
“…Proxy Re-Encryption (PRE) has received increased academic attention recently, leading to the development of several well-known PRE schemes [2][3][4][5][6]. However, many of these schemes rely on traditional public-key cryptosystems (PKC) [7][8][9][10] or identity-based cryptosystems [11][12][13][14], which can introduce certain limitations and challenges.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Proxy Re-Encryption (PRE) has received increased academic attention recently, leading to the development of several well-known PRE schemes [2][3][4][5][6]. However, many of these schemes rely on traditional public-key cryptosystems (PKC) [7][8][9][10] or identity-based cryptosystems [11][12][13][14], which can introduce certain limitations and challenges.…”
Section: Related Workmentioning
confidence: 99%
“…(b) The algorithm calculates user i's certificate Cert i = y i + αH 1 (id i , pk i ). 4. Encrypt: On inputting message m ∈ {0, 1} n , identity id A , the public key pk A = (pk A1 , pk A2 ), and public parameter params, the user does the following:…”
Section: (B)mentioning
confidence: 99%
“…But, the designed method was not efficient to attain higher data confidentiality. An improved revocable and identity‐based conditional proxy re‐encryption (RIB‐CPRE) method was introduced in reference 13 with ciphertext evolution (CE) for secure and efficient cloud data sharing. But, the computational complexity of the algorithms was improved.…”
Section: Related Workmentioning
confidence: 99%
“…Bu maksatla, şifreleme algoritmaları başta olmak üzere çeşitli teknikler kullanılarak çalışmalar gerçekleştirilmekted ir. Çalışmada [20], bulut ortamında güvenli ve etkin beri paylaşımı kapsamında, mevcut vekil yeniden şifreleme şemalarındaki uygulanabilirlik ve güvenlik ile ilgili yetersizlikleri gidermek için, kimlik tabanlı durumsal vekil yeniden şifreleme şeması (RIB-CPRE-CE) sunulmuştur. Bulut ortamında güvenli veri paylaşımı için blok zincir tabanlı şifreli metin politikalı özellik tabanlı şifreleme şemasının (BCAS) ortaya konulduğu çalışmada [21], veri sahiplerinin veriyi çözebilecek kullanıcıları belirlemesin e imkân sağlayan, kullanıcı işlemlerini süresiz saklayan bireçok şifreleme yaklaşımıyla verinin bir kez şifrelenmesinin yeterli olduğu bir sistem sunulmuştur.…”
Section: Veri Paylaşımı (Data Sharing)unclassified