Please use this identifier to cite or link to this item: https://doi.org/10.1109/ACCESS.2019.2906290
DC FieldValue
dc.titleA New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality
dc.contributor.authorHe, K.
dc.contributor.authorMao, Y.
dc.contributor.authorNing, J.
dc.contributor.authorLiang, K.
dc.contributor.authorHuang, X.
dc.contributor.authorPanaousis, E.
dc.contributor.authorLoukas, G.
dc.date.accessioned2021-11-16T07:25:49Z
dc.date.available2021-11-16T07:25:49Z
dc.date.issued2019
dc.identifier.citationHe, K., Mao, Y., Ning, J., Liang, K., Huang, X., Panaousis, E., Loukas, G. (2019). A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality. IEEE Access 7 : 50658-50668. ScholarBank@NUS Repository. https://doi.org/10.1109/ACCESS.2019.2906290
dc.identifier.issn2169-3536
dc.identifier.urihttps://scholarbank.nus.edu.sg/handle/10635/206407
dc.description.abstractEncryption technologies have become one of the most prevalent solutions to safeguard data confidentiality in many real-world applications, e.g., cloud-based data storage systems. Encryption outputting a relatively 'static' format of encrypted data, however, may hinder further data operations. For example, encrypted data may need to be 'transformed' into other formats for computation or other purposes. To enable encryption to be used in another device equipped with a different encryption mechanism, the concept of encryption switching was first proposed in CRYPTO 2016 for conversion particularly between Paillier and ElGamal encryptions. This paper considers the conversion between conventional identity-based and attribute-based encryptions and further proposes a concrete construction via the technique of proxy re-encryption. The construction is proved to be CPA secure in the standard model under q -decisional parallel bilinear Diffie-Hellman exponent assumption. The performance comparisons highlight that our bridging mechanism reduces computation and communication cost on the client side, especially when the data of the client is encrypted and outsourced to a remote cloud. The computational costs with respect to re-encryption (on the server side) and decryption (on the client side) are acceptable in practice. © 2013 IEEE.
dc.publisherInstitute of Electrical and Electronics Engineers Inc.
dc.rightsAttribution-NonCommercial-NoDerivatives 4.0 International
dc.rights.urihttps://creativecommons.org/licenses/by-nc-nd/4.0/
dc.sourceScopus OA2019
dc.subjectattribute-based encryption
dc.subjectCPA security
dc.subjectData security
dc.subjectencryption switching
dc.subjectidentity-based encryption
dc.subjectstandard model
dc.typeArticle
dc.contributor.departmentDEPARTMENT OF COMPUTER SCIENCE
dc.description.doi10.1109/ACCESS.2019.2906290
dc.description.sourcetitleIEEE Access
dc.description.volume7
dc.description.page50658-50668
Appears in Collections:Elements
Staff Publications

Show simple item record
Files in This Item:
File Description SizeFormatAccess SettingsVersion 
10_1109_ACCESS_2019_2906290.pdf4.68 MBAdobe PDF

OPEN

NoneView/Download

Google ScholarTM

Check

Altmetric


This item is licensed under a Creative Commons License Creative Commons