Journal on Communications ›› 2021, Vol. 42 ›› Issue (10): 67-80.doi: 10.11959/j.issn.1000-436x.2021187

• Papers • Previous Articles     Next Articles

AONT-and-NTRU-based rekeying scheme for encrypted deduplication

Chunfu JIA1,2, Guanxiong HA1,2, Shaoqiang WU1,2, Hang CHEN1,2, Ruiqi LI1,2   

  1. 1 College of Cyber Science, Nankai University, Tianjin 300350, China
    2 Tianjin Key Laboratory of Network and Data Security Technology, Tianjin 300350, China
  • Revised:2021-08-31 Online:2021-10-25 Published:2021-10-01
  • Supported by:
    The National Key Research and Development Program of China(2018YFA0704703);The National Natural Science Foundation of China(61972215);The National Natural Science Foundation of China(61972073);The National Natural Science Foundation of China(62172238);The Natural Science Foundation of Tianjin(20JCZDJC00640)

Abstract:

Rekeying is a good way to protect against key exposure.Most of the existing encrypted deduplication systems are implemented based on message-locked-encryption, in which multiple users with the identical data share the same encryption key.When a user updates keys, that update must be followed by all other data owners, which will incur large computational and communicational overheads.To solve this problem, an AONT-and-NTRU-based rekeying scheme was proposed, a variant of AONT was designed to solve the synchronization problem of multi-user rekeying, and a proxy re-encryption algorithm based on NTRU was introduced to reduce the communicational overhead for the system and computational overhead for clients during rekeying.The efficiency analysis and experimental results show that the proposed scheme has better encryption and decryption efficiency than existing schemes and the time cost of rekeying is significantly reduced.

Key words: cloud storage, encrypted deduplication, rekeying, AONT, NTRU

CLC Number: 

No Suggested Reading articles found!