Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Park, Seunghwan | - |
dc.contributor.author | Lee, Dong Hoon | - |
dc.date.accessioned | 2021-09-03T22:34:44Z | - |
dc.date.available | 2021-09-03T22:34:44Z | - |
dc.date.created | 2021-06-18 | - |
dc.date.issued | 2016-07 | - |
dc.identifier.issn | 1745-1361 | - |
dc.identifier.uri | https://scholar.korea.ac.kr/handle/2021.sw.korea/88279 | - |
dc.description.abstract | Designing secure revocable storage systems for a large number of users in a cloud-based environment is important. Cloud storage systems should allow its users to dynamically join and leave the storage service. Further, the rights of the users to access the data should be changed accordingly. Recently, Liang et al. proposed a cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation and delegation of decryption rights. Moreover, to reduce the size of the key update token, they employed a public key broadcast encryption system as a building block. In this paper, we show that the CR-IB-PRE scheme with the reduced key update token size is not secure against collusion attacks. | - |
dc.language | English | - |
dc.language.iso | en | - |
dc.publisher | IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG | - |
dc.title | Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme | - |
dc.type | Article | - |
dc.contributor.affiliatedAuthor | Lee, Dong Hoon | - |
dc.identifier.doi | 10.1587/transinf.2016EDL8042 | - |
dc.identifier.scopusid | 2-s2.0-84976892804 | - |
dc.identifier.wosid | 000381562700021 | - |
dc.identifier.bibliographicCitation | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, v.E99D, no.7, pp.1933 - 1936 | - |
dc.relation.isPartOf | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | - |
dc.citation.title | IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | - |
dc.citation.volume | E99D | - |
dc.citation.number | 7 | - |
dc.citation.startPage | 1933 | - |
dc.citation.endPage | 1936 | - |
dc.type.rims | ART | - |
dc.type.docType | Article | - |
dc.description.journalClass | 1 | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Information Systems | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Software Engineering | - |
dc.subject.keywordAuthor | revocable identity-based encryption | - |
dc.subject.keywordAuthor | key revocation | - |
dc.subject.keywordAuthor | cloud-based identity-based proxy re-encryption | - |
dc.subject.keywordAuthor | ciphertext update | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
(02841) 서울특별시 성북구 안암로 14502-3290-1114
COPYRIGHT © 2021 Korea University. All Rights Reserved.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.