{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,14]],"date-time":"2025-11-14T07:35:50Z","timestamp":1763105750656,"version":"3.37.3"},"reference-count":28,"publisher":"Wiley","license":[{"start":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T00:00:00Z","timestamp":1602547200000},"content-version":"unspecified","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61662039","2018-0-00508","20194010201800"],"award-info":[{"award-number":["61662039","2018-0-00508","20194010201800"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003621","name":"Ministry of Science, ICT and Future Planning","doi-asserted-by":"publisher","award":["61662039","2018-0-00508","20194010201800"],"award-info":[{"award-number":["61662039","2018-0-00508","20194010201800"]}],"id":[{"id":"10.13039\/501100003621","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003052","name":"Ministry of Trade, Industry and Energy","doi-asserted-by":"publisher","award":["61662039","2018-0-00508","20194010201800"],"award-info":[{"award-number":["61662039","2018-0-00508","20194010201800"]}],"id":[{"id":"10.13039\/501100003052","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Security and Communication Networks"],"published-print":{"date-parts":[[2020,10,13]]},"abstract":"<jats:p>In order to solve the challenges of user data security in the cloud computing (storage) environment, many encryption solutions with different features have been presented. Among them, proxy reencryption (PRE) based on public-key infrastructure (PKI) is a promising technology for secure cloud sharing. And identity-based proxy reencryption (IBPRE), which uses identity as the public key, eliminates burdensome certificate management and is, therefore, more preferable. However, most of the current IBPRE schemes only focus on the processing of data sharing while overlooking the functions of authorization revocation and ciphertext update, which are more closely related to the security of data itself. Moreover, the few existing schemes that involve ciphertext update turn out to be impractical because the length of ciphertext increases with the reencryption of ciphertext. In this paper, an improved IBPRE scheme, which provides improvements on the inadequacies of the scheme proposed by Ateniese et al. especially in terms of collusion safety and ciphertext evolution, is proposed. To the best of our knowledge, this is a practical IBPRE scheme integrating the functions of access authorization, delegation revocation, ciphertext update, reauthorization, and conditional reservation delegation. The proposed technique has high practicability in the scenario where a large number of ciphertexts need to be updated synchronously. Lastly, the comparative analysis and simulation results show that the two reencryption algorithms in the proposed scheme have the shortest computing time than other schemes.<\/jats:p>","DOI":"10.1155\/2020\/8833693","type":"journal-article","created":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T19:50:05Z","timestamp":1602705005000},"page":"1-16","source":"Crossref","is-referenced-by-count":9,"title":["A Collusion-Resistant Identity-Based Proxy Reencryption Scheme with Ciphertext Evolution for Secure Cloud Sharing"],"prefix":"10.1155","volume":"2020","author":[{"given":"Shimao","family":"Yao","sequence":"first","affiliation":[{"name":"School of Information Science and Technology, Jiujiang University, Jiujiang 322005, China"},{"name":"Information and Communication Engineering, Kunsan National University, Gunsan 54150, Republic of Korea"}]},{"given":"Ravi","family":"Sankar","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, University of South Florida, Tampa 33620, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3936-1116","authenticated-orcid":true,"given":"In-Ho","family":"Ra","sequence":"additional","affiliation":[{"name":"Information and Communication Engineering, Kunsan National University, Gunsan 54150, Republic of Korea"}]}],"member":"311","reference":[{"key":"1","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1016\/j.ins.2018.09.013","article-title":"Identity-based Key-Exposure Resilient Cloud Storage Public Auditing Scheme from Lattices","author":"X. Zhang","year":"2019","journal-title":"Information Sciences"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2899300"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.04.051"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/access.2018.2873019"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2914117"},{"first-page":"1","article-title":"Secure sharing of partially homomorphic encrypted IoT data","author":"H. Shafagh","key":"6"},{"article-title":"Recommendation for Key Management","year":"2020","author":"National Institute of Standards and Technology","key":"7"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/tc.2015.2417544"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2016.12.005"},{"first-page":"257","article-title":"An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing","author":"K. Liang","key":"10"},{"first-page":"14","article-title":"An improved cloud-based revocable identity-based proxy re-encryption scheme","author":"C. Wang","key":"11"},{"first-page":"127","article-title":"Divertible protocols and atomic proxy cryptography","author":"M. Blaze","key":"12"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2017.03.005"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"first-page":"185","article-title":"Chosen-ciphertext secure proxy re-encryption","author":"R. Canetti","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/tit.2011.2104470"},{"first-page":"189","article-title":"Identity-based proxy re-encryption without random oracles","author":"C.-K. Chu","key":"17"},{"first-page":"288","article-title":"Identity-based proxy re-encryption","author":"M. Green","key":"18"},{"first-page":"276","article-title":"Attribute based proxy re-encryption with delegating capabilities","author":"X. Liang","key":"19"},{"first-page":"552","article-title":"A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security","author":"K. Liang","key":"20"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03515-4_1"},{"first-page":"586","article-title":"Identity-based encryption from the weil pairing","author":"D. Boneh","key":"22"},{"first-page":"114","article-title":"Efficient identity-based encryption without random oracles","author":"B. Waters","key":"23"},{"first-page":"327","article-title":"New identity-based proxy re-encryption schemes to prevent collusion attacks","author":"L. Wang","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2010.06.029"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.04.013"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.09.027"},{"author":"B. Lynn","key":"28","article-title":"PBC: pairing-based cryptography"}],"container-title":["Security and Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8833693.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8833693.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/scn\/2020\/8833693.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T19:50:07Z","timestamp":1602705007000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.hindawi.com\/journals\/scn\/2020\/8833693\/"}},"subtitle":[],"editor":[{"given":"Clemente","family":"Galdi","sequence":"additional","affiliation":[]}],"short-title":[],"issued":{"date-parts":[[2020,10,13]]},"references-count":28,"alternative-id":["8833693","8833693"],"URL":"https:\/\/doi.org\/10.1155\/2020\/8833693","relation":{},"ISSN":["1939-0122","1939-0114"],"issn-type":[{"type":"electronic","value":"1939-0122"},{"type":"print","value":"1939-0114"}],"subject":[],"published":{"date-parts":[[2020,10,13]]}}}