Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Self-updatable encryption with short public parameters and its extensions

Authors
Lee, Kwangsu
Issue Date
Apr-2016
Publisher
SPRINGER
Keywords
Public-key encryption; Self-updatable encryption; Ciphertext delegation; Cloud storage; Bilinear maps
Citation
DESIGNS CODES AND CRYPTOGRAPHY, v.79, no.1, pp.121 - 161
Indexed
SCIE
SCOPUS
Journal Title
DESIGNS CODES AND CRYPTOGRAPHY
Volume
79
Number
1
Start Page
121
End Page
161
URI
https://scholar.korea.ac.kr/handle/2021.sw.korea/89041
DOI
10.1007/s10623-015-0039-9
ISSN
0925-1022
Abstract
Cloud storage is very popular since it has many advantages, but there is a new threat to cloud storage that was not considered before. Self-updatable encryption that updates a past ciphertext to a future ciphertext by using a public key is a new cryptographic primitive introduced by Lee et al. (in: Sako K, Sarkar P (eds) Advances in cryptology-ASIACRYPT 2013, 2013) to defeat this threat, in which an adversary who obtained a past private key can still decrypt a (previously unread) past ciphertext stored in cloud storage. Additionally, an SUE scheme can be combined with an attribute-based encryption (ABE) scheme to construct a powerful revocable-storage ABE (RS-ABE) scheme introduced by Sahai et al. (in: Safavi-Naini R, Canetti R (eds) Advances in cryptology-CRYPTO 2012, 2012) that provides the key revocation and ciphertext updating functionality for cloud storage. In this paper, we propose an efficient SUE scheme and its extended schemes. First, we propose an SUE scheme with short public parameters in prime-order bilinear groups and prove its security under a -type assumption. Next, we extend our SUE scheme to a time-interval SUE (TI-SUE) scheme that supports a time interval in ciphertexts. Our TI-SUE scheme has short public parameters and it is also secure under the -type assumption. Finally, we propose the first large universe RS-ABE scheme with short public parameters in prime-order bilinear groups and prove its security in the selective revocation list model under a -type assumption.
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Altmetrics

Total Views & Downloads

BROWSE