Please use this identifier to cite or link to this item:
https://doi.org/10.1109/ACCESS.2019.2906290
DC Field | Value | |
---|---|---|
dc.title | A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality | |
dc.contributor.author | He, K. | |
dc.contributor.author | Mao, Y. | |
dc.contributor.author | Ning, J. | |
dc.contributor.author | Liang, K. | |
dc.contributor.author | Huang, X. | |
dc.contributor.author | Panaousis, E. | |
dc.contributor.author | Loukas, G. | |
dc.date.accessioned | 2021-11-16T07:25:49Z | |
dc.date.available | 2021-11-16T07:25:49Z | |
dc.date.issued | 2019 | |
dc.identifier.citation | He, K., Mao, Y., Ning, J., Liang, K., Huang, X., Panaousis, E., Loukas, G. (2019). A New Encrypted Data Switching Protocol: Bridging IBE and ABE Without Loss of Data Confidentiality. IEEE Access 7 : 50658-50668. ScholarBank@NUS Repository. https://doi.org/10.1109/ACCESS.2019.2906290 | |
dc.identifier.issn | 2169-3536 | |
dc.identifier.uri | https://scholarbank.nus.edu.sg/handle/10635/206407 | |
dc.description.abstract | Encryption technologies have become one of the most prevalent solutions to safeguard data confidentiality in many real-world applications, e.g., cloud-based data storage systems. Encryption outputting a relatively 'static' format of encrypted data, however, may hinder further data operations. For example, encrypted data may need to be 'transformed' into other formats for computation or other purposes. To enable encryption to be used in another device equipped with a different encryption mechanism, the concept of encryption switching was first proposed in CRYPTO 2016 for conversion particularly between Paillier and ElGamal encryptions. This paper considers the conversion between conventional identity-based and attribute-based encryptions and further proposes a concrete construction via the technique of proxy re-encryption. The construction is proved to be CPA secure in the standard model under q -decisional parallel bilinear Diffie-Hellman exponent assumption. The performance comparisons highlight that our bridging mechanism reduces computation and communication cost on the client side, especially when the data of the client is encrypted and outsourced to a remote cloud. The computational costs with respect to re-encryption (on the server side) and decryption (on the client side) are acceptable in practice. © 2013 IEEE. | |
dc.publisher | Institute of Electrical and Electronics Engineers Inc. | |
dc.rights | Attribution-NonCommercial-NoDerivatives 4.0 International | |
dc.rights.uri | https://creativecommons.org/licenses/by-nc-nd/4.0/ | |
dc.source | Scopus OA2019 | |
dc.subject | attribute-based encryption | |
dc.subject | CPA security | |
dc.subject | Data security | |
dc.subject | encryption switching | |
dc.subject | identity-based encryption | |
dc.subject | standard model | |
dc.type | Article | |
dc.contributor.department | DEPARTMENT OF COMPUTER SCIENCE | |
dc.description.doi | 10.1109/ACCESS.2019.2906290 | |
dc.description.sourcetitle | IEEE Access | |
dc.description.volume | 7 | |
dc.description.page | 50658-50668 | |
Appears in Collections: | Elements Staff Publications |
Show simple item record
Files in This Item:
File | Description | Size | Format | Access Settings | Version | |
---|---|---|---|---|---|---|
10_1109_ACCESS_2019_2906290.pdf | 4.68 MB | Adobe PDF | OPEN | None | View/Download |
This item is licensed under a Creative Commons License