Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates

The emergence of cloud computing enables users to upload data to remote clouds and compute them. This drastically reduces computing and storage costs for users. Considering secure computing for multilevel users in enterprises, the notion of hierarchical identity-based inner product functional encryp...

Full description

Saved in:
Bibliographic Details
Main Authors: Cheng-Yi Lee, Zi-Yuan Liu, Masahiro Mambo, Raylin Tso
Format: Article
Language:English
Published: Wiley 2024-01-01
Series:IET Information Security
Online Access:http://dx.doi.org/10.1049/2024/5535196
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832542985080799232
author Cheng-Yi Lee
Zi-Yuan Liu
Masahiro Mambo
Raylin Tso
author_facet Cheng-Yi Lee
Zi-Yuan Liu
Masahiro Mambo
Raylin Tso
author_sort Cheng-Yi Lee
collection DOAJ
description The emergence of cloud computing enables users to upload data to remote clouds and compute them. This drastically reduces computing and storage costs for users. Considering secure computing for multilevel users in enterprises, the notion of hierarchical identity-based inner product functional encryption (HIB-IPFE) is proposed. In this cryptosystem, a sender can encrypt a vector x→ into a ciphertext with a hierarchical identity, while a receiver who possesses a secret key corresponding to the same hierarchical identity and a vector y→ can decrypt the ciphertext and obtain the inner product x→,y→. However, HIB-IPFE is not sufficient to capture flexible data sharing and forward security. In this study, we present a notion of hierarchical identity-based puncturable HIBP-IPFE. Furthermore, we present a formal definition and security model of HIBP-IPFE to guarantee data confidentiality and receiver anonymity. Compared with HIB-IPFE, our proposed scheme enables users to puncture keys on specific tags ensuring that the punctured keys cannot be used to decrypt the ciphertexts associated with those tags. The proposed scheme is provably secure under d-DBDHE assumption in the standard model. The experimental results indicate that our scheme is more practical in cloud computing, with superior functionality.
format Article
id doaj-art-e4d3f3522566470c841a65c43f5d40cd
institution Kabale University
issn 1751-8717
language English
publishDate 2024-01-01
publisher Wiley
record_format Article
series IET Information Security
spelling doaj-art-e4d3f3522566470c841a65c43f5d40cd2025-02-03T12:02:18ZengWileyIET Information Security1751-87172024-01-01202410.1049/2024/5535196Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product PredicatesCheng-Yi Lee0Zi-Yuan Liu1Masahiro Mambo2Raylin Tso3Graduate School of Natural Science and TechnologyGraduate School of Natural Science and TechnologyInstitute of Science and EngineeringDepartment of Computer ScienceThe emergence of cloud computing enables users to upload data to remote clouds and compute them. This drastically reduces computing and storage costs for users. Considering secure computing for multilevel users in enterprises, the notion of hierarchical identity-based inner product functional encryption (HIB-IPFE) is proposed. In this cryptosystem, a sender can encrypt a vector x→ into a ciphertext with a hierarchical identity, while a receiver who possesses a secret key corresponding to the same hierarchical identity and a vector y→ can decrypt the ciphertext and obtain the inner product x→,y→. However, HIB-IPFE is not sufficient to capture flexible data sharing and forward security. In this study, we present a notion of hierarchical identity-based puncturable HIBP-IPFE. Furthermore, we present a formal definition and security model of HIBP-IPFE to guarantee data confidentiality and receiver anonymity. Compared with HIB-IPFE, our proposed scheme enables users to puncture keys on specific tags ensuring that the punctured keys cannot be used to decrypt the ciphertexts associated with those tags. The proposed scheme is provably secure under d-DBDHE assumption in the standard model. The experimental results indicate that our scheme is more practical in cloud computing, with superior functionality.http://dx.doi.org/10.1049/2024/5535196
spellingShingle Cheng-Yi Lee
Zi-Yuan Liu
Masahiro Mambo
Raylin Tso
Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
IET Information Security
title Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
title_full Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
title_fullStr Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
title_full_unstemmed Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
title_short Privacy-Enhanced Data Sharing Systems from Hierarchical ID-Based Puncturable Functional Encryption with Inner Product Predicates
title_sort privacy enhanced data sharing systems from hierarchical id based puncturable functional encryption with inner product predicates
url http://dx.doi.org/10.1049/2024/5535196
work_keys_str_mv AT chengyilee privacyenhanceddatasharingsystemsfromhierarchicalidbasedpuncturablefunctionalencryptionwithinnerproductpredicates
AT ziyuanliu privacyenhanceddatasharingsystemsfromhierarchicalidbasedpuncturablefunctionalencryptionwithinnerproductpredicates
AT masahiromambo privacyenhanceddatasharingsystemsfromhierarchicalidbasedpuncturablefunctionalencryptionwithinnerproductpredicates
AT raylintso privacyenhanceddatasharingsystemsfromhierarchicalidbasedpuncturablefunctionalencryptionwithinnerproductpredicates