2017
DOI: 10.1002/dac.3494
|View full text |Cite
|
Sign up to set email alerts
|

SecCloudSharing: Secure data sharing in public cloud using ciphertext‐policy attribute‐based proxy re‐encryption with revocation

Abstract: An efficient cryptography mechanism should enforce an access control policy over the encrypted data to provide flexible, fine-grained, and secure data access control for secure sharing of data in cloud storage. To make a secure cloud data sharing solution, we propose a ciphertext-policy attribute-based proxy re-encryption scheme. In the proposed scheme, we design an efficient fine-grained revocation mechanism, which enables not only efficient attribute-level revocation but also efficient policy-level revocatio… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(15 citation statements)
references
References 50 publications
0
11
0
Order By: Relevance
“…The computational overhead mainly includes encryption, reencryption, decryption and re-encrypted ciphertext decryption (re-decryption). Table 3 shows the comparison results of our scheme with references [44], [45] and [46], where T B is the bilinear operation, T E is the exponential operation on the multiplicative cyclic group. Compared with the above two operations, the multiplication operation's computation cost is very small and can be ignored.…”
Section: Computational Overheadmentioning
confidence: 99%
See 4 more Smart Citations
“…The computational overhead mainly includes encryption, reencryption, decryption and re-encrypted ciphertext decryption (re-decryption). Table 3 shows the comparison results of our scheme with references [44], [45] and [46], where T B is the bilinear operation, T E is the exponential operation on the multiplicative cyclic group. Compared with the above two operations, the multiplication operation's computation cost is very small and can be ignored.…”
Section: Computational Overheadmentioning
confidence: 99%
“…We use the hash function to sign the ciphertext. However, in references [44], [45] and [46], there is only data encryption and no signature process. Our scheme not only protects the integrity and non-repudiation of data, but also takes less time.…”
Section: Computational Overheadmentioning
confidence: 99%
See 3 more Smart Citations