CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lee, Kwangsu | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.contributor.author | Park, Jong Hwan | - |
dc.contributor.author | Yung, Moti | - |
dc.date.accessioned | 2021-09-01T17:04:54Z | - |
dc.date.available | 2021-09-01T17:04:54Z | - |
dc.date.created | 2021-06-19 | - |
dc.date.issued | 2019-04 | - |
dc.identifier.issn | 0010-4620 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/66531 | - |
dc.description.abstract | Self-updatable encryption (SUE) is a new kind of public-key encryption, motivated by cloud computing, which enables anyone (i.e. cloud server with no access to private keys) to update a past ciphertext to a future ciphertext by using a public key. The main applications of SUE are revocable-storage attribute-based encryption (RS-ABE) that provides an efficient and secure access control to encrypted data stored in cloud storage. In this setting, there is a new threat such that a revoked user still can access past ciphertexts given to him by a storage server. RS-ABE solves this problem by combining user revocation and ciphertext updating functionalities. We propose the first SUE and RS-ABE schemes secure against a relevant form of chosen-ciphertext security (CCA). Due to the fact that some ciphertexts are easily derived from others, we employ a different notion of CCA that avoids easy challenge related messages. Specifically, we define time extended challenge CCA security for SUE which excludes ciphertexts that are easily derived from the challenge (over time periods) from being queried on. We then propose an efficient SUE scheme with such CCA security, and we also present an RS-ABE scheme with this CCA security. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | OXFORD UNIV PRESS | - |
dc.subject | BATCH VERIFICATION | - |
dc.title | CCA Security for Self-Updatable Encryption: Protecting Cloud Data When Clients Read/Write Ciphertexts | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1093/comjnl/bxy122 | - |
dc.identifier.scopusid | 2-s2.0-85064177339 | - |
dc.identifier.wosid | 000465133500006 | - |
dc.identifier.bibliographicCitation | COMPUTER JOURNAL, v.62, no.4, pp.545 - 562 | - |
dc.relation.isPartOf | COMPUTER JOURNAL | - |
dc.citation.title | COMPUTER JOURNAL | - |
dc.citation.volume | 62 | - |
dc.citation.number | 4 | - |
dc.citation.startPage | 545 | - |
dc.citation.endPage | 562 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Hardware & Architecture | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.subject.keywordPlus | BATCH VERIFICATION | - |
dc.subject.keywordAuthor | public-key encryption | - |
dc.subject.keywordAuthor | self-updatable encryption | - |
dc.subject.keywordAuthor | chosen-ciphertext security | - |
dc.subject.keywordAuthor | cloud storage | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.