IEEE Access | |
A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality | |
Kaitai Liang1  Emmanouil Panaousis1  George Loukas2  Jianting Ning3  Xinyi Huang3  Yijun Mao4  Kai He5  | |
[1] Department of Computer Science, University of Surrey, Guildford, U.K.;Department of Computing and Information Systems, University of Greenwich, London, U.K.;School of Mathematics and Computer Science, Fujian Normal University, Fuzhou, China;School of Mathmatics and Informatics, South China University of Agriculture, Guangzhou, China;School of Software Engineering and Cyperspace Science, Dongguan University of Technology, Dongguan, China; | |
关键词: Data security; encryption switching; identity-based encryption; attribute-based encryption; CPA security; standard model; | |
DOI : 10.1109/ACCESS.2019.2906290 | |
来源: DOAJ |
【 摘 要 】
Encryption technologies have become one of the most prevalent solutions to safeguard data confidentiality in many real-world applications, e.g., cloud-based data storage systems. Encryption outputting a relatively “static” format of encrypted data, however, may hinder further data operations. For example, encrypted data may need to be “transformed” into other formats for computation or other purposes. To enable encryption to be used in another device equipped with a different encryption mechanism, the concept of encryption switching was first proposed in CRYPTO 2016 for conversion particularly between Paillier and ElGamal encryptions. This paper considers the conversion between conventional identity-based and attribute-based encryptions and further proposes a concrete construction via the technique of proxy re-encryption. The construction is proved to be CPA secure in the standard model under q-decisional parallel bilinear Diffie-Hellman exponent assumption. The performance comparisons highlight that our bridging mechanism reduces computation and communication cost on the client side, especially when the data of the client is encrypted and outsourced to a remote cloud. The computational costs with respect to re-encryption (on the server side) and decryption (on the client side) are acceptable in practice.
【 授权许可】
Unknown