Secure and efficient revocable key-aggregate cryptosystem for multiple non-predefined non-disjoint aggregate sets

Journal of Information Security and Applications - Tập 58 - Trang 102799 - 2021
Gaurav Pareek1, Purushothama B.R.1
1Department of Computer Science and Engineering, National Institute of Technology Goa, Farmagudi, Ponda 403401, Goa, India

Tài liệu tham khảo

Sundararajan, 2011, A survey on security issues in service delivery models of cloud computing, J Netw Comput Appl, 34, 1, 10.1016/j.jnca.2010.07.006 Mendez, 2017 Goh EJ, Shacham H, Modadugu N, Boneh D. Sirius: Securing remote untrusted storage. In: NDSS, vol. 3. 2003. p. 131–45. Chu, 2013, Key-aggregate cryptosystem for scalable data sharing in cloud storage, IEEE Trans Parallel Distrib Syst, 25, 468 Patranabis, 2015, Dynamic key-aggregate cryptosystem on elliptic curves for online data sharing, 25 Benaloh, 2009, Patient controlled encryption: ensuring privacy of electronic medical records, 103 Liu, 2018, Verifiable searchable encryption with aggregate keys for data sharing system, Future Gener Comput Syst, 78, 778, 10.1016/j.future.2017.02.024 Fan, 2018, Transformation between attribute-based encryption and key-aggregate cryptosystem, 35 Guo, 2018, Key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage, Future Gener Comput Syst, 84, 190, 10.1016/j.future.2017.07.038 Atallah, 2009, Dynamic and efficient key management for access hierarchies, ACM Trans Inf Syst Secur, 12, 18, 10.1145/1455526.1455531 Castiglione, 2016, Cryptographic hierarchical access control for dynamic structures, IEEE Trans Inf Forensics Secur, 11, 2349, 10.1109/TIFS.2016.2581147 Park, 2015, New constructions of revocable identity-based encryption from multilinear maps, IEEE Trans Inf Forensics Secur, 10, 1564, 10.1109/TIFS.2015.2419180 Gan, 2017, Revocable key-aggregate cryptosystem for data sharing in cloud, Secur Commun Netw, 2017, 10.1155/2017/2508693 Shi, 2015, Directly revocable key-policy attribute-based encryption with verifiable ciphertext delegation, Inform Sci, 295, 221, 10.1016/j.ins.2014.10.020 Derler, 2018, Revisiting proxy re-encryption: forward secrecy, improved security, and applications, 219 Park, 2012, Key management for multiple multicast groups in wireless networks, IEEE Trans Mob Comput, 12, 1712, 10.1109/TMC.2012.135 Patranabis, 2016, Provably secure key-aggregate cryptosystems with broadcast aggregate keys for online data sharing on the cloud, IEEE Trans Comput, 66, 891, 10.1109/TC.2016.2629510 Cui, 2015, Key-aggregate searchable encryption (kase) for group data sharing via cloud storage, IEEE Trans Comput, 65, 2374, 10.1109/TC.2015.2389959 Padhya, 2019, BTG-RKASE: privacy preserving revocable key aggregate searchable encryption with fine-grained multi-delegation & break-the-glass access control, 109 Chen, 2018, Efficient key-aggregate proxy re-encryption for secure data sharing in clouds, 1 Lee, 2016, Time-bound key-aggregate encryption for cloud storage, Secur Commun Netw, 9, 2059, 10.1002/sec.1463 Patranabis, 2016, Identity-based key aggregate cryptosystem from multilinear maps, IACR Cryptol ePrint Arch, 2016, 693 Boneh, 2005, Collusion resistant broadcast encryption with short ciphertexts and private keys, 258 Alimohammadi, 2019, A secure key-aggregate authentication cryptosystem for data sharing in dynamic cloud storage, Multimedia Tools Appl, 2019, 1 Boneh, 2001, Identity-based encryption from the weil pairing, 213 Oliveira, 2007, Tinytate: Computing the tate pairing in resource-constrained sensor nodes, 318 Akl, 1983, Cryptographic solution to a problem of access control in a hierarchy, ACM Trans Comput Syst, 1, 239, 10.1145/357369.357372 Sandhu, 1988, Cryptographic implementation of a tree hierarchy for access control, Inform Process Lett, 27, 95, 10.1016/0020-0190(88)90099-3 Harn, 1990, A cryptographic key generation scheme for multilevel data security, Comput Secur, 9, 539, 10.1016/0167-4048(90)90132-D Chen, 2013, Cloudhka: A cryptographic approach for hierarchical access control in cloud computing, 37 Chen, 2017, Hierarchical key assignment with dynamic read-write privilege enforcement and extended ki-security, 165 Coron, 2013, Practical multilinear maps over the integers, 476