Asymmetric cross-cryptosystem re-encryption applicable to efficient and secure mobile access to outsourced data

Hua Deng, Qianghong Wu, Bo Qin, Willy Susilo, Joseph Liu, Wenchang Shi

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

11 Citations (Scopus)

Abstract

With the increasing development of pervasive computing and wireless bandwidth communication, more mobile devices are used to access sensitive data stored in remote servers. In such applications, a practical issue emerges such as how to exploit the sufficient resource of a server so that the file owners can enforce fine-grained access control over the remotely stored files, while enable resource-limited mobile devices to easily access the protected data, especially if the storage server maintained by a third party is untrusted. This challenge mainly arises from the asymmetric capacity among the participants, i.e., the capacity limited mobile devices and the resource abundant server (and file owners equipped with fixed computers). To meet the security requirements in mobile access to sensitive data, we propose a new encryption paradigm, referred to as asymmetric cross-cryptosystem reencryption (ACCRE) by leveraging the asymmetric capacity of the participants. In ACCRE, relatively light-weight identity-based encryption (IBE) is deployed in mobile devices, while resource-consuming but versatile identity-based broadcast encryption (IBBE) is deployed in servers and fixed computers of the file owners. The core of ACCRE is a novel ciphertext conversion mechanism that allows an authorized proxy to convert a complicated IBBE ciphertext into a simple IBE ciphertext affordable to mobile devices, without leaking any sensitive information to the proxy. Following this paradigm, we propose an efficient ACCRE scheme with its security formally reduced to the security of the underlying IBE and IBBE schemes. Thorough theoretical analyses and extensive experiments confirm that the scheme takes very small cost for mobile devices to access encrypted data and is practical to secure mobile computing applications.
Original languageEnglish
Title of host publicationASIACCS'15 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
EditorsJianying Zhou, Gail-Joon Ahn
Place of PublicationNew York NY USA
PublisherAssociation for Computing Machinery (ACM)
Pages393 - 404
Number of pages12
ISBN (Print)9781450332453
DOIs
Publication statusPublished - 2015
Externally publishedYes
EventACM Symposium on Information, Computer and Communications Security 2015 - Singapore, Singapore
Duration: 14 Apr 201517 Apr 2015
Conference number: 10th
https://dl.acm.org/doi/proceedings/10.1145/2714576

Conference

ConferenceACM Symposium on Information, Computer and Communications Security 2015
Abbreviated titleAsiaCCS 2015
CountrySingapore
CitySingapore
Period14/04/1517/04/15
Internet address

Keywords

  • Data Security
  • Identity-based broadcast encryption
  • Identitybased encryption
  • Proxy re-encryption

Cite this