Skip navigation

A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality

A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality

He, Kai, Mao, Yijun, Ning, Jianting, Liang, Kaitai, Huang, Xinyi, Panaousis, Emmanouil ORCID logoORCID: https://orcid.org/0000-0001-7306-4062 and Loukas, George ORCID logoORCID: https://orcid.org/0000-0003-3559-5182 (2019) A new encrypted data switching Protocol: Bridging IBE and ABE without loss of data confidentiality. IEEE Access. pp. 1-12. ISSN 2169-3536 (Online) (doi:10.1109/ACCESS.2019.2906290)

[thumbnail of Publisher's PDF - Open Access]
Preview
PDF (Publisher's PDF - Open Access)
23622 LOUKAS_A_New_Encrypted_Data_Switching_Protocol_(OA)_2019.pdf - Published Version

Download (645kB) | Preview

Abstract

Encryption technologies have become one of the most prevalent solutions to safeguard data confidentiality in may real-world applications, e.g., cloud-based data storage systems. Encryption outputting a relatively “static” format of encrypted data, however, may hinder further data operations, for example, encrypted data may need to be “transformed” into other formats for either computation or other purposes. In order to enable an encryption to be used in another device equipped with a different encryption mechanism, the concept of encryption switching is first proposed in CRYPTO 2016 for conversion particularly between Paillier and ElGamal encryptions. This paper considers the conversion between conventional identity-based and attribute-based encryptions and further proposes a concrete construction via the technique of proxy reencryption. The construction is proved to be CPA secure in the standard model under q-decisional parallel bilinear Diffie-Hellman exponent assumption. The performance comparisons highlight that our bridging mechanism reduces computation and communication cost on client side, especially when the data of client is encrypted and outsourced to remote cloud. The computational costs w.r.t. re-encryption (on server side) and decryption (on client side) are acceptable in practice.

Item Type: Article
Additional Information: Open Access.
Uncontrolled Keywords: Data Security, Encryption Switching, Identity-Based Encryption, Attribute-Based Encryption, CPA Security, Standard Model
Subjects: Q Science > QA Mathematics > QA75 Electronic computers. Computer science
Faculty / School / Research Centre / Research Group: Faculty of Engineering & Science > Internet of Things and Security Research Centre (ISEC)
Faculty of Engineering & Science > School of Computing & Mathematical Sciences (CMS)
Faculty of Engineering & Science
Last Modified: 04 Mar 2022 13:06
URI: http://gala.gre.ac.uk/id/eprint/23622

Actions (login required)

View Item View Item

Downloads

Downloads per month over past year

View more statistics