Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
The emergence of cloud computing enables users to upload data to remote clouds and compute them. This drastically reduces computing and storage costs for users. Considering secure computing for multilevel users in enterprises, the notion of hierarchical identity-based inner product functional encryp...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2024-01-01
|
Series: | IET Information Security |
Online Access: | http://dx.doi.org/10.1049/2024/5535196 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832542985080799232 |
---|---|
author | Cheng-Yi Lee Zi-Yuan Liu Masahiro Mambo Raylin Tso |
author_facet | Cheng-Yi Lee Zi-Yuan Liu Masahiro Mambo Raylin Tso |
author_sort | Cheng-Yi Lee |
collection | DOAJ |
description | The emergence of cloud computing enables users to upload data to remote clouds and compute them. This drastically reduces computing and storage costs for users. Considering secure computing for multilevel users in enterprises, the notion of hierarchical identity-based inner product functional encryption (HIB-IPFE) is proposed. In this cryptosystem, a sender can encrypt a vector x→ into a ciphertext with a hierarchical identity, while a receiver who possesses a secret key corresponding to the same hierarchical identity and a vector y→ can decrypt the ciphertext and obtain the inner product x→,y→. However, HIB-IPFE is not sufficient to capture flexible data sharing and forward security. In this study, we present a notion of hierarchical identity-based puncturable HIBP-IPFE. Furthermore, we present a formal definition and security model of HIBP-IPFE to guarantee data confidentiality and receiver anonymity. Compared with HIB-IPFE, our proposed scheme enables users to puncture keys on specific tags ensuring that the punctured keys cannot be used to decrypt the ciphertexts associated with those tags. The proposed scheme is provably secure under d-DBDHE assumption in the standard model. The experimental results indicate that our scheme is more practical in cloud computing, with superior functionality. |
format | Article |
id | doaj-art-e4d3f3522566470c841a65c43f5d40cd |
institution | Kabale University |
issn | 1751-8717 |
language | English |
publishDate | 2024-01-01 |
publisher | Wiley |
record_format | Article |
series | IET Information Security |
spelling | doaj-art-e4d3f3522566470c841a65c43f5d40cd2025-02-03T12:02:18ZengWileyIET Information Security1751-87172024-01-01202410.1049/2024/5535196Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product PredicatesCheng-Yi Lee0Zi-Yuan Liu1Masahiro Mambo2Raylin Tso3Graduate School of Natural Science and TechnologyGraduate School of Natural Science and TechnologyInstitute of Science and EngineeringDepartment of Computer ScienceThe emergence of cloud computing enables users to upload data to remote clouds and compute them. This drastically reduces computing and storage costs for users. Considering secure computing for multilevel users in enterprises, the notion of hierarchical identity-based inner product functional encryption (HIB-IPFE) is proposed. In this cryptosystem, a sender can encrypt a vector x→ into a ciphertext with a hierarchical identity, while a receiver who possesses a secret key corresponding to the same hierarchical identity and a vector y→ can decrypt the ciphertext and obtain the inner product x→,y→. However, HIB-IPFE is not sufficient to capture flexible data sharing and forward security. In this study, we present a notion of hierarchical identity-based puncturable HIBP-IPFE. Furthermore, we present a formal definition and security model of HIBP-IPFE to guarantee data confidentiality and receiver anonymity. Compared with HIB-IPFE, our proposed scheme enables users to puncture keys on specific tags ensuring that the punctured keys cannot be used to decrypt the ciphertexts associated with those tags. The proposed scheme is provably secure under d-DBDHE assumption in the standard model. The experimental results indicate that our scheme is more practical in cloud computing, with superior functionality.http://dx.doi.org/10.1049/2024/5535196 |
spellingShingle | Cheng-Yi Lee Zi-Yuan Liu Masahiro Mambo Raylin Tso Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates IET Information Security |
title | Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates |
title_full | Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates |
title_fullStr | Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates |
title_full_unstemmed | Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates |
title_short | Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates |
title_sort | privacy enhanced data sharing systems from hierarchical id based puncturable functional encryption with inner product predicates |
url | http://dx.doi.org/10.1049/2024/5535196 |
work_keys_str_mv | AT chengyilee privacyenhanceddatasharingsystemsfromhierarchicalidbasedpuncturablefunctionalencryptionwithinnerproductpredicates AT ziyuanliu privacyenhanceddatasharingsystemsfromhierarchicalidbasedpuncturablefunctionalencryptionwithinnerproductpredicates AT masahiromambo privacyenhanceddatasharingsystemsfromhierarchicalidbasedpuncturablefunctionalencryptionwithinnerproductpredicates AT raylintso privacyenhanceddatasharingsystemsfromhierarchicalidbasedpuncturablefunctionalencryptionwithinnerproductpredicates |