{"title":"Key-Aggregate Proxy Re-Encryption with Dynamic Condition Generation Using Multilinear Map","authors":"Chun-I Fan, Yi-Fan Tseng, Yen-Lin Huang","doi":"10.1109/AsiaJCIS50894.2020.00014","DOIUrl":null,"url":null,"abstract":"With the growing accessibility of the internet, many people store files in the cloud storage. In consideration of privacy preserving, users tent to encrypt their files before uploading them to the cloud. Under certain conditions, a file owner may want to share the encrypted files directly on the cloud. In such cases, the file owner will delegate the re-encryption ability to a proxy with re-encryption keys. However, Chen et al. found that the size of the re-encryption key (or condition key) would increase with the number of the conditions, which motivated them in proposing the concept of key-aggregate proxy re-encryption. Unfortunately, we found that the conditions cannot be changed arbitrarily once we set the conditions at the beginning. To solve the problem, we apply the multilinear maps to the key-aggregate proxy re-encryption to extend the number of conditions to be exponentially large, while keeping the size of public parameters small and practical.","PeriodicalId":247481,"journal":{"name":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 15th Asia Joint Conference on Information Security (AsiaJCIS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/AsiaJCIS50894.2020.00014","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
With the growing accessibility of the internet, many people store files in the cloud storage. In consideration of privacy preserving, users tent to encrypt their files before uploading them to the cloud. Under certain conditions, a file owner may want to share the encrypted files directly on the cloud. In such cases, the file owner will delegate the re-encryption ability to a proxy with re-encryption keys. However, Chen et al. found that the size of the re-encryption key (or condition key) would increase with the number of the conditions, which motivated them in proposing the concept of key-aggregate proxy re-encryption. Unfortunately, we found that the conditions cannot be changed arbitrarily once we set the conditions at the beginning. To solve the problem, we apply the multilinear maps to the key-aggregate proxy re-encryption to extend the number of conditions to be exponentially large, while keeping the size of public parameters small and practical.