Publication Type
Journal Article
Version
acceptedVersion
Publication Date
4-2020
Abstract
With the rapid development of cloud computing, an increasing number of individuals and organizations are sharing data in the public cloud. To protect the privacy of data stored in the cloud, a data owner usually encrypts his data in such a way that certain designated data users can decrypt the data. This raises a serious problem when the encrypted data needs to be shared to more people beyond those initially designated by the data owner. To address this problem, we introduce and formalize an identity-based encryption transformation (IBET) model by seamlessly integrating two well-established encryption mechanisms, namely identity-basedencryption (IBE) and identity-based broadcast encryption (IBBE). In IBET, data users are identified and authorized for data access based on their recognizable identities, which avoids complicated certificate management in usual secure distributed systems. More importantly, IBET provides a transformation mechanism that converts an IBE ciphertext into an IBBE ciphertext so that a new group of users not specified during the IBE encryption can access the underlying data. We design a concrete IBET scheme based on bilinear groups and prove its security against powerful attacks. Thorough theoretical and experimental analyses demonstrate the high efficiency and practicability of the proposed scheme.
Keywords
Cloud computing, Data sharing, Data privacy, Access control, Cryptographic encryption
Discipline
Information Security
Research Areas
Cybersecurity
Publication
IEEE Transactions on Information Forensics and Security
Volume
15
First Page
3168
Last Page
3180
ISSN
1556-6013
Identifier
10.1109/TIFS.2020.2985532
Publisher
Institute of Electrical and Electronics Engineers
Citation
DENG, Robert H.; QIN, Zheng; WU, Qianhong; GUAN, Zhenyu; DENG, Robert H.; WANG, Yujue; and ZHOU, Yunya.
Identity-based encryption transformation for flexible sharing of encrypted data in public cloud. (2020). IEEE Transactions on Information Forensics and Security. 15, 3168-3180.
Available at: https://ink.library.smu.edu.sg/sis_research/7129
Creative Commons License
This work is licensed under a Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International License.