Anonymous Identity-Based Broadcast Encryption with Revocation for File Sharing
نویسندگان
چکیده
Traditionally, a ciphertext from an identity-based broadcast encryption can be distributed to a group of receivers whose identities are included in the ciphertext. Once the ciphertext has been created, it is not possible to remove any intended receivers from it without conducting decryption. In this paper, we consider an interesting question: how to remove target designated receivers from a ciphertext generated by an anonymous identity-based broadcast encryption? The solution to this question is found applicable to file sharing with revocation. In this work, we found an affirmative answer to this question. We construct an anonymous identity-based broadcast encryption, which offers the user revocation of ciphertext and the revocation process does not reveal any information of the plaintext and receiver identity. In our proposed scheme, the group of receiver identities are anonymous and only known by the encryptor. We prove that our scheme is semantically secure in the random oracle model.
منابع مشابه
Protected Data Sharing scheme with Multi- Ownership for Non Static Groups in the Cloud
Cloud computing offers an economical and efficient solution for sharing group resources among cloud users i.e. the individual can now run the application from anywhere in the world, as the server provides the processing power to the application and the server is also connected to a network via Internet or other connection platforms to be accessed from anywhere and with the character of low main...
متن کاملUser Revocation Based Anonymous Access Provision for Efficient Cloud User Privacy
Cloud computing is a recent technology provides a flexible, on-demand and low cost feature of computing resources. The Main issue in Cloud Computing is user identity privacy and data content privacy. The User Privacy in Cloud Computing is achieved by various data access control Schemes. Existing Fully Anonymous Access control scheme with decentralized attribute authority provides data content p...
متن کاملFunctional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation
In functional encryption (FE) schemes, ciphertexts and private keys are associated with attributes and decryption is possible whenever key and ciphertext attributes are suitably related. It is known that expressive realizations can be obtained from a simple FE flavor called inner product encryption (IPE), where decryption is allowed whenever ciphertext and key attributes form orthogonal vectors...
متن کاملEfficient User Revocation for Dynamic Groups in the Cloud
Mona, secure data sharing in a multi-owner manner for dynamic groups preserves data, identity privacy from an untrusted cloud and allows frequent change of the membership. In RLS while the number of invoked users grows larger, the length of RL increases. To send all user revocation details to the group members for sharing purpose, leads to communication overhead .To address this issue, in this ...
متن کاملHierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers
With rapid development of cloud computing, more and more enterprises will outsource their sensitive data for sharing in a cloud. To keep the shared data confidential against untrusted cloud service providers (CSPs), a natural way is to store only the encrypted data in a cloud. The key problems of this approach include establishing access control for the encrypted data, and revoking the access r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016