Please use this identifier to cite or link to this item:
https://doi.org/10.1109/ACCESS.2019.2906290
Title: | A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality | Authors: | He, K. Mao, Y. Ning, J. Liang, K. Huang, X. Panaousis, E. Loukas, G. |
Keywords: | attribute-based encryption CPA security Data security encryption switching identity-based encryption standard model |
Issue Date: | 2019 | Publisher: | Institute of Electrical and Electronics Engineers Inc. | Citation: | He, K., Mao, Y., Ning, J., Liang, K., Huang, X., Panaousis, E., Loukas, G. (2019). A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality. IEEE Access 7 : 50658-50668. ScholarBank@NUS Repository. https://doi.org/10.1109/ACCESS.2019.2906290 | Rights: | Attribution-NonCommercial-NoDerivatives 4.0 International | Abstract: | Encryption technologies have become one of the most prevalent solutions to safeguard data confidentiality in many real-world applications, e.g., cloud-based data storage systems. Encryption outputting a relatively 'static' format of encrypted data, however, may hinder further data operations. For example, encrypted data may need to be 'transformed' into other formats for computation or other purposes. To enable encryption to be used in another device equipped with a different encryption mechanism, the concept of encryption switching was first proposed in CRYPTO 2016 for conversion particularly between Paillier and ElGamal encryptions. This paper considers the conversion between conventional identity-based and attribute-based encryptions and further proposes a concrete construction via the technique of proxy re-encryption. The construction is proved to be CPA secure in the standard model under q -decisional parallel bilinear Diffie-Hellman exponent assumption. The performance comparisons highlight that our bridging mechanism reduces computation and communication cost on the client side, especially when the data of the client is encrypted and outsourced to a remote cloud. The computational costs with respect to re-encryption (on the server side) and decryption (on the client side) are acceptable in practice. © 2013 IEEE. | Source Title: | IEEE Access | URI: | https://scholarbank.nus.edu.sg/handle/10635/206407 | ISSN: | 2169-3536 | DOI: | 10.1109/ACCESS.2019.2906290 | Rights: | Attribution-NonCommercial-NoDerivatives 4.0 International |
Appears in Collections: | Elements Staff Publications |
Show full item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
10_1109_ACCESS_2019_2906290.pdf | 4.68 MB | Adobe PDF | OPEN | None | View/Download |
This item is licensed under a Creative Commons License