Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme
Designing secure revocable storage systems for a large number of users in a cloud-based environment is important. Cloud storage systems should allow its users to dynamically join and leave the storage service. Further, the rights of the users to access the data should be changed accordingly. Recentl...
Saved in:
Published in | IEICE Transactions on Information and Systems Vol. E99.D; no. 7; pp. 1933 - 1936 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
The Institute of Electronics, Information and Communication Engineers
2016
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Designing secure revocable storage systems for a large number of users in a cloud-based environment is important. Cloud storage systems should allow its users to dynamically join and leave the storage service. Further, the rights of the users to access the data should be changed accordingly. Recently, Liang et al. proposed a cloud-based revocable identity-based proxy re-encryption (CR-IB-PRE) scheme that supports user revocation and delegation of decryption rights. Moreover, to reduce the size of the key update token, they employed a public key broadcast encryption system as a building block. In this paper, we show that the CR-IB-PRE scheme with the reduced key update token size is not secure against collusion attacks. |
---|---|
ISSN: | 0916-8532 1745-1361 |
DOI: | 10.1587/transinf.2016EDL8042 |