Audit-Free Cloud Storage via Deniable Attribute-Based Encryption

被引:35
作者
Chi, Po-Wen [1 ]
Lei, Chin-Laung [1 ]
机构
[1] Natl Taiwan Univ, Dept Elect Engn, Distributed Comp & Network Secur DCNS Lab, Taipei, Taiwan
关键词
Deniable encryption; composite order bilinear group; attribute-based encryption; cloud storage; SECURE;
D O I
10.1109/TCC.2015.2424882
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cloud storage services have become increasingly popular. Because of the importance of privacy, many cloud storage encryption schemes have been proposed to protect data from those who do not have access. All such schemes assumed that cloud storage providers are safe and cannot be hacked; however, in practice, some authorities (i.e., coercers) may force cloud storage providers to reveal user secrets or confidential data on the cloud, thus altogether circumventing storage encryption schemes. In this paper, we present our design for a new cloud storage encryption scheme that enables cloud storage providers to create convincing fake user secrets to protect user privacy. Since coercers cannot tell if obtained secrets are true or not, the cloud storage providers ensure that user privacy is still securely protected.
引用
收藏
页码:414 / 427
页数:14
相关论文
共 29 条
[1]  
[Anonymous], IACR CRYPTOLOGY EPRI
[2]   Attribute-based encryption schemes with constant-size ciphertexts [J].
Attrapadung, Nuttapong ;
Herranz, Javier ;
Laguillaumie, Fabien ;
Libert, Benoit ;
de Panafieu, Elie ;
Rafols, Carla .
THEORETICAL COMPUTER SCIENCE, 2012, 422 :15-38
[3]  
Barker E., 2012, SP80057 NIST 1
[4]  
Beimel A., 1996, ISRAEL
[5]  
Bendlin R., 2011, 2011046 CRYPT EPRINT
[6]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[7]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
[8]   Chosen-ciphertext security from identity-based encryption [J].
Boneh, Dan ;
Canetti, Ran ;
Halevi, Shai ;
Katz, Jonathan .
SIAM JOURNAL ON COMPUTING, 2006, 36 (05) :1301-1328
[9]  
Boneh D, 2006, LECT NOTES COMPUT SC, V4004, P573
[10]  
Canetti R, 1997, LECT NOTES COMPUT SC, V1294, P90