Cargando…
A Quantum secure sharing protocol for Cloud data based on proxy re-encryption
A quantum scheme for cloud data sharing based on proxy re-encryption is proposed. The user Alice stores the cipher-text of her data on cloud data center. When Alice wants to share her data with another user Bob, Alice is called the delegator and Bob is called the delegatee. The cloud service provide...
Autores principales: | , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2020
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7270149/ https://www.ncbi.nlm.nih.gov/pubmed/32493906 http://dx.doi.org/10.1038/s41598-020-65738-y |
_version_ | 1783541860053024768 |
---|---|
author | Chang, Yan Zhang, Shi-Bin Yan, Li-Li Wan, Guo-gen |
author_facet | Chang, Yan Zhang, Shi-Bin Yan, Li-Li Wan, Guo-gen |
author_sort | Chang, Yan |
collection | PubMed |
description | A quantum scheme for cloud data sharing based on proxy re-encryption is proposed. The user Alice stores the cipher-text of her data on cloud data center. When Alice wants to share her data with another user Bob, Alice is called the delegator and Bob is called the delegatee. The cloud service provider (called the proxy) can convert the delegator’s cipher-text into the delegatee’s cipher-text without decrypting the former, so that the delegatee can get the plain-text of Alice’s data with his private key. The proxy cannot obtain the plain-text of the user’s data stored on cloud data center. Delegator in the protocol should have the ability of producing Bell states, performing Bell basis and Z-basis measurements, and storing qubits. The quantum requirements for the delegatee are reduced. The delegatee needs to have the ability of reflecting and performing Z-basis measurement. One secret at a time (one-time one-pad) is theoretically implemented, especially when the same data is shared multiple times. The anti-selection plain-text attack security and the anti-selective cipher-text attack security are realized. Fine-granularity secret data sharing is achieved flexibly. |
format | Online Article Text |
id | pubmed-7270149 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2020 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-72701492020-06-05 A Quantum secure sharing protocol for Cloud data based on proxy re-encryption Chang, Yan Zhang, Shi-Bin Yan, Li-Li Wan, Guo-gen Sci Rep Article A quantum scheme for cloud data sharing based on proxy re-encryption is proposed. The user Alice stores the cipher-text of her data on cloud data center. When Alice wants to share her data with another user Bob, Alice is called the delegator and Bob is called the delegatee. The cloud service provider (called the proxy) can convert the delegator’s cipher-text into the delegatee’s cipher-text without decrypting the former, so that the delegatee can get the plain-text of Alice’s data with his private key. The proxy cannot obtain the plain-text of the user’s data stored on cloud data center. Delegator in the protocol should have the ability of producing Bell states, performing Bell basis and Z-basis measurements, and storing qubits. The quantum requirements for the delegatee are reduced. The delegatee needs to have the ability of reflecting and performing Z-basis measurement. One secret at a time (one-time one-pad) is theoretically implemented, especially when the same data is shared multiple times. The anti-selection plain-text attack security and the anti-selective cipher-text attack security are realized. Fine-granularity secret data sharing is achieved flexibly. Nature Publishing Group UK 2020-06-03 /pmc/articles/PMC7270149/ /pubmed/32493906 http://dx.doi.org/10.1038/s41598-020-65738-y Text en © The Author(s) 2020 Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this license, visit http://creativecommons.org/licenses/by/4.0/. |
spellingShingle | Article Chang, Yan Zhang, Shi-Bin Yan, Li-Li Wan, Guo-gen A Quantum secure sharing protocol for Cloud data based on proxy re-encryption |
title | A Quantum secure sharing protocol for Cloud data based on proxy re-encryption |
title_full | A Quantum secure sharing protocol for Cloud data based on proxy re-encryption |
title_fullStr | A Quantum secure sharing protocol for Cloud data based on proxy re-encryption |
title_full_unstemmed | A Quantum secure sharing protocol for Cloud data based on proxy re-encryption |
title_short | A Quantum secure sharing protocol for Cloud data based on proxy re-encryption |
title_sort | quantum secure sharing protocol for cloud data based on proxy re-encryption |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7270149/ https://www.ncbi.nlm.nih.gov/pubmed/32493906 http://dx.doi.org/10.1038/s41598-020-65738-y |
work_keys_str_mv | AT changyan aquantumsecuresharingprotocolforclouddatabasedonproxyreencryption AT zhangshibin aquantumsecuresharingprotocolforclouddatabasedonproxyreencryption AT yanlili aquantumsecuresharingprotocolforclouddatabasedonproxyreencryption AT wanguogen aquantumsecuresharingprotocolforclouddatabasedonproxyreencryption AT changyan quantumsecuresharingprotocolforclouddatabasedonproxyreencryption AT zhangshibin quantumsecuresharingprotocolforclouddatabasedonproxyreencryption AT yanlili quantumsecuresharingprotocolforclouddatabasedonproxyreencryption AT wanguogen quantumsecuresharingprotocolforclouddatabasedonproxyreencryption |