Asymmetric cross-cryptosystem re-encryption applicable to efficient and secure mobile access to outsourced data

  • Hua Deng
  • , Qianhong Wu
  • , Bo Qin
  • , Willy Susilo
  • , Joseph Liu
  • , Wenchang Shi

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

With the increasing development of pervasive computing and wireless bandwidth communication, more mobile devices are used to access sensitive data stored in remote servers. In such applications, a practical issue emerges such as how to exploit the sufficient resource of a server so that the file owners can enforce fine-grained access control over the remotely stored files, while enable resource-limited mobile devices to easily access the protected data, especially if the storage server maintained by a third party is untrusted. This challenge mainly arises from the asymmetric capacity among the participants, i.e., the capacity limited mobile devices and the resource abundant server (and file owners equipped with fixed computers). To meet the security requirements in mobile access to sensitive data, we propose a new encryption paradigm, referred to as asymmetric cross-cryptosystem reencryption (ACCRE) by leveraging the asymmetric capacity of the participants. In ACCRE, relatively light-weight identity-based encryption (IBE) is deployed in mobile devices, while resource-consuming but versatile identity-based broadcast encryption (IBBE) is deployed in servers and fixed computers of the file owners. The core of ACCRE is a novel ciphertext conversion mechanism that allows an authorized proxy to convert a complicated IBBE ciphertext into a simple IBE ciphertext affordable to mobile devices, without leaking any sensitive information to the proxy. Following this paradigm, we propose an efficient ACCRE scheme with its security formally reduced to the security of the underlying IBE and IBBE schemes. Thorough theoretical analyses and extensive experiments confirm that the scheme takes very small cost for mobile devices to access encrypted data and is practical to secure mobile computing applications.

Original languageEnglish
Title of host publicationASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security
PublisherAssociation for Computing Machinery
Pages393-404
Number of pages12
ISBN (Electronic)9781450332453
DOIs
StatePublished - 14 Apr 2015
Event10th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2015 - Singapore, Singapore
Duration: 14 Apr 201517 Apr 2015

Publication series

NameASIACCS 2015 - Proceedings of the 10th ACM Symposium on Information, Computer and Communications Security

Conference

Conference10th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2015
Country/TerritorySingapore
CitySingapore
Period14/04/1517/04/15

Keywords

  • Data Security
  • Identity-based broadcast encryption
  • Identity-based encryption
  • Proxy re-encryption

Fingerprint

Dive into the research topics of 'Asymmetric cross-cryptosystem re-encryption applicable to efficient and secure mobile access to outsourced data'. Together they form a unique fingerprint.

Cite this