#### DMCA

## Mona: Secure Multi-Owner Data Sharing for Dynamic Groups (2013)

Venue: | in the Cloud” IEEE TRANSACTIONS ON PARALLEL AND ISTRIBUTED SYSTEMS, VOL |

Citations: | 27 - 2 self |

### Citations

1740 | Identity-based encryption from the Weil pairing
- Boneh, Franklin
(Show Context)
Citation Context ...les stored in the cloud before his participation. 3 PRELIMINARIES 3.1 Bilinear Maps Let G1 and G2 be an additive cyclic group and a multiplicative cyclic group of the same prime order q, respectively =-=[11]-=-. Let e : G1 G1 ! G2 denote a bilinear map constructed with the following properties: 1. Bilinear: For all a; b 2 Z q and P;Q 2 G1, eðaP ; bQÞ eðP;QÞ ab . 2. Nondegenerate: There exists a point P su... |

753 | Short signature from the Weil pairing
- Boneh, Lynn, et al.
- 2001
(Show Context)
Citation Context ...ontained current date tRL. In addition, the revocation list is bounded by a signature sigðRLÞ to declare its validity. The signature is generated by the group manager with the BLS signature algorithm =-=[20]-=-, i.e., sigðRLÞ f1ðRLÞ. Finally, the group manager migrates the revocation list into the cloud for public usage. 5.2.4 File Generation To store and share a data file in the cloud, a group member per... |

641 | Group signatures - Chaum, Heyst - 1991 |

520 | Attribute-based encryption for fine-grained access control of encrypted data
- Goyal, Pandey, et al.
- 2006
(Show Context)
Citation Context ... not addressed in their scheme. Yu et al. [3] presented a scalable and fine-grained data access control scheme in cloud computing based on the key policy attribute-based encryption (KP-ABE) technique =-=[9]-=-. Unfortunately, the singleowner manner hinders the adoption of their scheme into the case, where any user is granted to store and share data. Our contributions. To solve the challenges presented abov... |

386 | Short group signatures - Boneh, Boyen, et al. |

375 | Security arguments for digital signatures and blind signatures, Journal of Cryptology 13 (3) (2000) 361–396. Please cite this article in press as
- Pointcheval, Stern
(Show Context)
Citation Context ...: Suppose that an attacker A succeeds to forge a valid group signature with a nonnegligible probability in polynomial time. In addition, we assume f is a random oracle. According to the Forking Lemma =-=[21]-=-, by using the ut utLIU ET AL.: MONA: SECURE MULTI-OWNER DATA SHARING FOR DYNAMIC GROUPS IN THE CLOUD 1189 oracle replay technique, the attacker A obtains two valid signatures ðM; 0;c; 1Þ and ðM; 0;c... |

327 | Broadcast encryption
- Fiat, Naor
- 1993
(Show Context)
Citation Context ...ariant of the short group signature scheme [12] will be used to achieve anonymous access control, as it supports efficient membership revocation. 3.4 Dynamic Broadcast Encryption Broadcast encryption =-=[16]-=- enables a broadcaster to transmit encrypted data to a set of users so that only a privileged subset of users can decrypt the data. Besides the above characteristics, dynamic broadcast encryption also... |

269 | Hierarchical identity based encryption with constant size ciphertext
- Boneh, Boyen, et al.
- 2005
(Show Context)
Citation Context ...nition 2 (Decision linear (DL) Assumption [12]). Given P1;P2;P3;aP1;bP2;cP3, it is infeasible to decide whether a þ b c mod q. Definition 3 (Weak Bilinear Diffie-Hellman Exponent (WBDHE) Assumption =-=[13]-=-). For unknown a 2 Zq , given Y;aY;a2Y ; ::; alY;P 2 G1, it is infeasible to compute eðY;PÞ 1 a. Definition 4 ((t,n)-general Diffie-Hellman Exponent (GDHE) Assumption [14]). Let fðXÞ r i1ðX þ xiÞ a... |

248 | Revocation and tracing schemes for stateless receivers
- Naor, Naor, et al.
(Show Context)
Citation Context ...ized users. The user revocation in the scheme is an intractable issue especially for large-scale sharing, since the file metadata needs to be updated. In their extension version, the NNL construction =-=[10]-=- is used for efficient key revocation. However, when a new user joins the group, the private key of each user in an NNL system needs to be recomputed, which may limit the application for dynamic group... |

228 | Plutus: scalable secure file sharing on untrusted storage - Kallahalla, Riedel, et al. - 2003 |

202 | Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage,”
- Ateniese, Fu, et al.
- 2006
(Show Context)
Citation Context ...dating the secret keys of the remaining users is also desired to minimize the complexity of key management. Several security schemes for data sharing on untrusted servers have been proposed [4], [5], =-=[6]-=-. In these approaches, data owners store the encrypted data files in untrusted storage and distribute the corresponding decryption keys only to authorized users. Thus, unauthorized users as well as st... |

147 | Sirius: securing remote untrusted storage - Goh, Shacham, et al. - 2003 |

135 | Privacy-preserving public auditing for data storage security in cloud computing
- Wang, Wang, et al.
- 2010
(Show Context)
Citation Context ...ilar to [3], [7], we assume that the cloud server is honest but curious. That is, the cloud server will not maliciously delete or modify user data due to the protection of data auditing schemes [17], =-=[18]-=-, but will try to learn the content of the stored data and the identities of cloud users. Group manager takes charge of system parameters generation, user registration, user revocation, and revealing ... |

133 | Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
- Waters
(Show Context)
Citation Context ...umber of revoked users, respectively. By setting a group with a single attribute, Lu et al. [7] proposed a secure provenance scheme based on the ciphertext-policy attribute-based encryption technique =-=[8]-=-, which allows any member in a group to share data with others. However, the issue of user revocation is not addressed in their scheme. Yu et al. [3] presented a scalable and fine-grained data access ... |

129 | Cryptographic cloud storage
- Kamara, Lauter
- 2010
(Show Context)
Citation Context ...s stored in the cloud may be sensitive and confidential, such as business plans. To preserve data privacy, a basic solution is to encrypt data files, and then upload the encrypted data into the cloud =-=[2]-=-. Unfortunately, designing an efficient and secure data sharing scheme for groups in the cloud is not an easy task due to the following challenging issues. . X. Liu, B. Wang, and J. Yan are with the N... |

48 | Fully Collusion Secure Dynamic Broadcast Encryption with Constant-Size Ciphertexts or Decryption Keys,”
- Delerablee, Paillier, et al.
- 2007
(Show Context)
Citation Context ... Exponent (WBDHE) Assumption [13]). For unknown a 2 Zq , given Y;aY;a2Y ; ::; alY;P 2 G1, it is infeasible to compute eðY;PÞ 1 a. Definition 4 ((t,n)-general Diffie-Hellman Exponent (GDHE) Assumption =-=[14]-=-). Let fðXÞ r i1ðX þ xiÞ and n r gðXÞ i1 ðX þ x0 iÞ be the two random univariate polynomials. For unknown k; 2 Zq , given G0; G0; :::; eðG0;H0Þ f2 ð Þgð Þ 2 G2; t 1 G0; fð ÞG0;P0; :::; t 1 P0;kg... |

33 | Knox: Privacy-Preserving Auditing for Shared Data with Large Groups
- Wang, Li, et al.
- 2012
(Show Context)
Citation Context ...n. Similar to [3], [7], we assume that the cloud server is honest but curious. That is, the cloud server will not maliciously delete or modify user data due to the protection of data auditing schemes =-=[17]-=-, [18], but will try to learn the content of the stored data and the identities of cloud users. Group manager takes charge of system parameters generation, user registration, user revocation, and reve... |

28 | Verifiable privacy-preserving range query in two-tiered sensor networks,” - Sheng, Li - 2008 |

19 |
Secure Provenance: The Essential of Bread and
- Lu, Lin, et al.
- 2010
(Show Context)
Citation Context ...rticipation and revocation in these schemes are linearly increasing with the number of data owners and the number of revoked users, respectively. By setting a group with a single attribute, Lu et al. =-=[7]-=- proposed a secure provenance scheme based on the ciphertext-policy attribute-based encryption technique [8], which allows any member in a group to share data with others. However, the issue of user r... |

15 |
Sirius: Securing Remote Untrusted
- Goh, Shacham, et al.
- 2003
(Show Context)
Citation Context ...ut updating the secret keys of the remaining users is also desired to minimize the complexity of key management. Several security schemes for data sharing on untrusted servers have been proposed [4], =-=[5]-=-, [6]. In these approaches, data owners store the encrypted data files in untrusted storage and distribute the corresponding decryption keys only to authorized users. Thus, unauthorized users as well ... |

5 |
Verifiable PrivacyPreserving Range Query
- Sheng, Li
- 2008
(Show Context)
Citation Context ...secret as follows: P1 1 8 P 2 G1 þ x1 1 >< P2 P 2 G1 ð þ x1Þð þ x2Þ 1 ð2Þ Pr P 2 G1 ð þ x1Þð þ x2Þ ð þ xrÞ 1 >: Zr Zð þ x1Þð þ x2Þ ð þ xrÞ 2 G2: Motivated by the verifiable reply mechanism in =-=[19]-=-, to guarantee that users obtain the latest version of the1186 IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 24, NO. 6, JUNE 2013 revocation list, we let the group manger update the rev... |