Please use this identifier to cite or link to this item: https://doi.org/10.1109/ACCESS.2019.2906290
Title: A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality
Authors: He, K.
Mao, Y.
Ning, J. 
Liang, K.
Huang, X.
Panaousis, E.
Loukas, G.
Keywords: attribute-based encryption
CPA security
Data security
encryption switching
identity-based encryption
standard model
Issue Date: 2019
Publisher: Institute of Electrical and Electronics Engineers Inc.
Citation: He, K., Mao, Y., Ning, J., Liang, K., Huang, X., Panaousis, E., Loukas, G. (2019). A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality. IEEE Access 7 : 50658-50668. ScholarBank@NUS Repository. https://doi.org/10.1109/ACCESS.2019.2906290
Rights: Attribution-NonCommercial-NoDerivatives 4.0 International
Abstract: Encryption technologies have become one of the most prevalent solutions to safeguard data confidentiality in many real-world applications, e.g., cloud-based data storage systems. Encryption outputting a relatively 'static' format of encrypted data, however, may hinder further data operations. For example, encrypted data may need to be 'transformed' into other formats for computation or other purposes. To enable encryption to be used in another device equipped with a different encryption mechanism, the concept of encryption switching was first proposed in CRYPTO 2016 for conversion particularly between Paillier and ElGamal encryptions. This paper considers the conversion between conventional identity-based and attribute-based encryptions and further proposes a concrete construction via the technique of proxy re-encryption. The construction is proved to be CPA secure in the standard model under q -decisional parallel bilinear Diffie-Hellman exponent assumption. The performance comparisons highlight that our bridging mechanism reduces computation and communication cost on the client side, especially when the data of the client is encrypted and outsourced to a remote cloud. The computational costs with respect to re-encryption (on the server side) and decryption (on the client side) are acceptable in practice. © 2013 IEEE.
Source Title: IEEE Access
URI: https://scholarbank.nus.edu.sg/handle/10635/206407
ISSN: 2169-3536
DOI: 10.1109/ACCESS.2019.2906290
Rights: Attribution-NonCommercial-NoDerivatives 4.0 International
Appears in Collections:Elements
Staff Publications

Show full item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
10_1109_ACCESS_2019_2906290.pdf4.68 MBAdobe PDF

OPEN

NoneView/Download

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons