12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China

Research Article

A Fine-grained Conditional Proxy Broadcast ReEncryption Policy for File Sharing System

Download807 downloads
  • @INPROCEEDINGS{10.4108/eai.29-6-2019.2282387,
        author={Yongjun  Ren and Yepeng  Liu and Chengshan  Qian},
        title={A Fine-grained Conditional Proxy Broadcast ReEncryption Policy for File Sharing System},
        proceedings={12th EAI International Conference on Mobile Multimedia Communications, Mobimedia 2019, 29th - 30th Jun 2019, Weihai, China},
        publisher={EAI},
        proceedings_a={MOBIMEDIA},
        year={2019},
        month={6},
        keywords={conditional proxy re-encryption proxy broadcast re-encryption cloud storage secure},
        doi={10.4108/eai.29-6-2019.2282387}
    }
    
  • Yongjun Ren
    Yepeng Liu
    Chengshan Qian
    Year: 2019
    A Fine-grained Conditional Proxy Broadcast ReEncryption Policy for File Sharing System
    MOBIMEDIA
    EAI
    DOI: 10.4108/eai.29-6-2019.2282387
Yongjun Ren,*, Yepeng Liu1, Chengshan Qian2
  • 1: School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, China
  • 2: Binjiang College, Nanjing University of Information Science & Technology, Wuxi, China
*Contact email: renyj100@126.com

Abstract

With the proliferation of electronic devices, cloud storage has become an integral part of synchronizing files between devices. However, data stored on the cloud is vulnerable to unauthorized access during the sharing process. The traditional conditional proxy broadcast re-encryption solution is suitable for the above application scenarios but does not support flexible control of conditions. This article describes the concept of fine-grained conditional proxy broadcast re-encryption (FGC-BPRE). The scheme utilizes an access tree to generate a re-encryption key. If the ciphertext keyword satisfies the conditions in the access tree, the proxy can convert the user's ciphertext into a new ciphertext for a group of users. In addition, this paper also constructs a fine-grained conditional proxy broadcast re-encryption scheme and verifies the security of selective ciphertext attacks without oracles.