{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T01:27:04Z","timestamp":1760059624107,"version":"build-2065373602"},"reference-count":30,"publisher":"MDPI AG","issue":"7","license":[{"start":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T00:00:00Z","timestamp":1750896000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China","award":["U1705264","2024-Y-013","2024-SG-005","2024H6008","2023-ZD-003","2022-ZD-022"],"award-info":[{"award-number":["U1705264","2024-Y-013","2024-SG-005","2024H6008","2023-ZD-003","2022-ZD-022"]}]},{"name":"Fuzhou Science and Technology Planning Projects","award":["U1705264","2024-Y-013","2024-SG-005","2024H6008","2023-ZD-003","2022-ZD-022"],"award-info":[{"award-number":["U1705264","2024-Y-013","2024-SG-005","2024H6008","2023-ZD-003","2022-ZD-022"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Symmetry"],"abstract":"<jats:p>Cloud computing has witnessed widespread adoption across numerous sectors, primarily due to its substantial storage capacity and powerful computational resources. In this context, secure data sharing in cloud environments is critically important. Identity-based broadcast proxy re-encryption (IB-BPRE) has emerged as a promising solution; however, existing IB-BPRE schemes lack dynamic functionality\u2014specifically, the ability to support user revocation and addition without updating re-encryption keys. Consequently, data owners must frequently reset and distribute these keys in response to user membership changes, leading to increased system complexity and communication overhead. In this paper, we propose an identity-based broadcast proxy re-encryption scheme with dynamic functionality (IB-BPRE-DF) to address this challenge. The proposed scheme utilizes a symmetric design of re-encryption keys to enable dynamic user updates while preserving a constant re-encryption key size. Furthermore, IB-BPRE-DF is constructed under the (f,g,F)-GDDHE assumption and achieves semantic security in the random oracle model. Performance evaluations demonstrate that IB-BPRE-DF significantly reduces both the communication overhead (by maintaining a constant size for the re-encryption key and re-encrypted ciphertext) and the computational burden (with near-zero computational cost for generating the re-encryption key) for resource-constrained users. This work provides a practical and scalable cryptographic solution for secure and efficient data sharing in dynamic cloud environments.<\/jats:p>","DOI":"10.3390\/sym17071008","type":"journal-article","created":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T11:15:23Z","timestamp":1750936523000},"page":"1008","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Identity-Based Broadcast Proxy Re-Encryption with Dynamic Functionality for Flexible Data Sharing in Cloud Environments"],"prefix":"10.3390","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2601-9976","authenticated-orcid":false,"given":"Huidan","family":"Hu","sequence":"first","affiliation":[{"name":"School of Mathematics and Statistics, Key Laboratory of Analytical Mathematics and Applications (Ministry of Education), Fujian Key Laboratory of Analytical Mathematics and Applications (FJKLAMA), Fujian Normal University, Fuzhou 350117, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Huasong","family":"Jin","sequence":"additional","affiliation":[{"name":"Fujian Zhong Xin Network Security Information Technology Co., Ltd., Fuzhou 350014, China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Changlu","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Mathematics and Statistics, Key Laboratory of Analytical Mathematics and Applications (Ministry of Education), Fujian Key Laboratory of Analytical Mathematics and Applications (FJKLAMA), Fujian Normal University, Fuzhou 350117, China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2025,6,26]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","unstructured":"Blaze, M., Bleumer, G., and Strauss, M. (1998). Divertible protocols and atomic proxy cryptography. Advances in Cryptology-EUROCRYPT-98, Springer.","DOI":"10.1007\/BFb0054122"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2919","DOI":"10.1109\/TIFS.2024.3357240","article-title":"Public trace-and-revoke proxy re-encryption for secure data sharing in clouds","volume":"19","author":"Luo","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"5797","DOI":"10.1109\/TDSC.2024.3386690","article-title":"Efficient fine-grained data sharing based on proxy re-encryption in IIoT","volume":"21","author":"Zhang","year":"2024","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1186\/s13677-024-00608-w","article-title":"A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption","volume":"13","author":"Liu","year":"2024","journal-title":"J. Cloud Comput."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3421508","article-title":"Multi-tier stack of block chain with proxy re-encryption method scheme on the internet of things platform","volume":"22","author":"Rawal","year":"2021","journal-title":"ACM Trans. Internet Technol. (TOIT)"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Lin, S., Cui, L., and Ke, N. (2024). End-to-end encrypted message distribution system for the Internet of Things based on conditional proxy re-encryption. Sensors, 24.","DOI":"10.3390\/s24020438"},{"key":"ref_7","unstructured":"Green, M., and Ateniese, G. (2007). Identity-based proxy re-encryption. Applied Cryptography and Network Security: Proceedings of the 5th International Conference, ACNS 2007, Zhuhai, China, 5\u20138 June 2007, Springer. Proceedings 5."},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Boneh, D., and Franklin, M. (2001, January 19\u201323). Identity-based encryption from the Weil pairing. Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/TC.2015.2417544","article-title":"Conditional identity-based broadcast proxy re-encryption and its application to cloud email","volume":"65","author":"Xu","year":"2015","journal-title":"IEEE Trans. Comput."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1109\/TDSC.2017.2714166","article-title":"AP-PRE: Autonomous path proxy re-encryption and its applications","volume":"16","author":"Cao","year":"2017","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Liu, S., Han, S., and Zhang, H. (2023, January 4\u20138). Fine-grained proxy re-encryption: Definitions and constructions from LWE. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China.","DOI":"10.1007\/978-981-99-8736-8_7"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Liu, S., and Han, S. (2024, January 15\u201317). Multi-hop fine-grained proxy re-encryption. Proceedings of the IACR International Conference on Public-Key Cryptography, Sydney, Australia.","DOI":"10.1007\/978-3-031-57728-4_6"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"110373","DOI":"10.1016\/j.comnet.2024.110373","article-title":"Proxy re-encryption for secure data sharing with blockchain in internet of medical things","volume":"245","author":"Pei","year":"2024","journal-title":"Comput. Netw."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Fiat, A., and Naor, M. (1994). Broadcast encryption. Advances in Cryptology-CRYPTO\u201993, Springer.","DOI":"10.1007\/3-540-48329-2_40"},{"key":"ref_15","doi-asserted-by":"crossref","unstructured":"Boneh, D., Gentry, C., and Waters, B. (2005). Collusion resistant broadcast encryption with short ciphertexts and private keys. Advances in Cryptology-CRYPTO 2005, Springer.","DOI":"10.1007\/11535218_16"},{"key":"ref_16","unstructured":"Boneh, D., Gentry, C., and Waters, B. (2007). Identity-based broadcast encryption with constant size ciphertexts and private keys. Advances in Cryptology-ASIACRYPT 2007, Springer."},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Chu, C.K., Weng, J., Chow, S.S.M., Zhou, J., and Deng, R.H. (2009, January 1\u20133). Conditional proxy broadcast re-encryption. Proceedings of the 14th Australasian Conference on Information Security and Privacy, Brisbane, Australia.","DOI":"10.1007\/978-3-642-02620-1_23"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"10455","DOI":"10.1007\/s11042-017-4448-9","article-title":"A proxy broadcast re-encryption for cloud data sharing","volume":"77","author":"Sun","year":"2018","journal-title":"Multimed. Tools Appl."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"5610","DOI":"10.1109\/TVT.2020.2982422","article-title":"P2B: Privacy preserving identity-based broadcast proxy re-encryption","volume":"69","author":"Maiti","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"4830","DOI":"10.1109\/TIFS.2023.3299466","article-title":"Identity-based broadcast proxy re-encryption for flexible data sharing in VANETs","volume":"18","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Liu, X., Song, H., Li, Z., Yin, Y., Han, G., and Liu, S. (2024, January 26\u201328). Identity-Based Threshold Broadcast Proxy Re-encryption Plus Scheme. Proceedings of the International Conference on Frontiers in Cyber Security, Chongquing, China.","DOI":"10.1007\/978-981-96-0151-6_26"},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Li, B., Deng, L., and Mou, Y. (2024, January 13\u201315). A Pairing-Free Identity-Based Broadcast Proxy Re-Encryption Scheme for the Cloud. Proceedings of the 2024 14th International Conference on Information Technology in Medicine and Education (ITME), Guiyang, China.","DOI":"10.1109\/ITME63426.2024.00109"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Li, B., Deng, L., Liu, H., Mou, Y., Qu, Y., and Wang, N. (IEEE Trans. Veh. Technol., 2025). A CCA-Secure Pairing-Free Broadcast Proxy Re-Encryption Scheme for VANETs, IEEE Trans. Veh. Technol., early access.","DOI":"10.1109\/TVT.2025.3579252"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"1214","DOI":"10.1109\/TDSC.2019.2899300","article-title":"Revocable identity-based broadcast proxy re-encryption for data sharing in clouds","volume":"18","author":"Ge","year":"2019","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"15642","DOI":"10.1109\/JIOT.2023.3265028","article-title":"CBP: Coalitional-Game-Based Broadcast Proxy Re-Encryption in IoT","volume":"10","author":"Maiti","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1016\/j.comcom.2023.11.020","article-title":"MBP: Multi-channel broadcast proxy re-encryption for cloud-based IoT devices","volume":"214","author":"Maiti","year":"2024","journal-title":"Comput. Commun."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Chen, L., Zhang, M., and Li, J. (IEEE Trans. Reliab., 2025). Conditional Identity-Based Broadcast Proxy Re-Encryption With Anonymity and Revocation, IEEE Trans. Reliab., early access.","DOI":"10.1109\/TR.2024.3521507"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"3113","DOI":"10.1016\/j.dam.2007.12.010","article-title":"Pairings for cryptographers","volume":"156","author":"Galbraith","year":"2008","journal-title":"Discret. Appl. Math."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Boneh, D., Boyen, X., and Goh, E.J. (2005, January 22\u201326). Hierarchical identity based encryption with constant size ciphertext. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark.","DOI":"10.1007\/11426639_26"},{"key":"ref_30","unstructured":"Lynn, B. (2014, May 07). On the Implementation of Pairing-Based Cryptosystems. Available online: http:\/\/crypto.stanford.edu\/pbc."}],"container-title":["Symmetry"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/7\/1008\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:59:14Z","timestamp":1760032754000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-8994\/17\/7\/1008"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,26]]},"references-count":30,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2025,7]]}},"alternative-id":["sym17071008"],"URL":"https:\/\/doi.org\/10.3390\/sym17071008","relation":{},"ISSN":["2073-8994"],"issn-type":[{"type":"electronic","value":"2073-8994"}],"subject":[],"published":{"date-parts":[[2025,6,26]]}}}