iconOpen Access

ARTICLE

Evolve and Revoke: A Secure and Efficient Conditional Proxy Re-Encryption Scheme with Ciphertext Evolution

Han-Yu Lin, Tung-Tso Tsai*, Yi-Jia Ye

Department of Computer Science and Engineering, National Taiwan Ocean University, Keelung, 202, Taiwan

* Corresponding Author: Tung-Tso Tsai. Email: email

(This article belongs to the Special Issue: Advances in IoT Security: Challenges, Solutions, and Future Applications)

Computers, Materials & Continua 2026, 87(1), 65 https://doi.org/10.32604/cmc.2025.073553

Abstract

Cloud data sharing is an important issue in modern times. To maintain the privacy and confidentiality of data stored in the cloud, encryption is an inevitable process before uploading the data. However, the centralized management and transmission latency of the cloud makes it difficult to support real-time processing and distributed access structures. As a result, fog computing and the Internet of Things (IoT) have emerged as crucial applications. Fog-assisted proxy re-encryption is a commonly adopted technique for sharing cloud ciphertexts. It allows a semi-trusted proxy to transform a data owner’s ciphertext into another re-encrypted ciphertext intended for a data requester, without compromising any information about the original ciphertext. Yet, the user revocation and cloud ciphertext renewal problems still lack effective and secure mechanisms. Motivated by it, we propose a revocable conditional proxy re-encryption scheme offering ciphertext evolution (R-CPRE-CE). In particular, a periodically updated time key is used to revoke the user’s access privileges while an access condition prevents a malicious proxy from re-encrypting unauthorized ciphertext. We also demonstrate that our scheme is provably secure under the notion of indistinguishability against adaptively chosen identity and chosen ciphertext attacks in the random oracle model. Performance analysis shows that our scheme reduces the computation time for a complete data access cycle from an initial query to the final decryption by approximately 47.05% compared to related schemes.

Keywords

Revocable; proxy re-encryption; conditional access control; ciphertext evolution; fog computing

1  Introduction

The prevalence of cloud computing [1] and the emergence of various fog computing [2] applications have changed our ways in the utilization, sharing, and value-added creation of information. In diversified Internet of Things (IoT) applications such as intelligent transportation systems [3] and healthcare management systems, IoT devices play a crucial role in the circulation and sharing of gathered information. Specifically, in the healthcare applications, the widespread use of wearable devices and various wireless sensors enables healthcare professionals to remotely monitor patients’ physiological data. The personal health data collected through IoT devices can serve as a valuable resource for medical research.

However, data owners might be concerned about data privacy and confidentiality when sharing their data in clouds. Another challenge is how to revoke user’s access privileges, so as to achieve forward security. Proxy Re-Encryption (PRE) schemes [410] are commonly adopted techniques for sharing data in cloud environments. A PRE scheme allows an authorized proxy like a fog node to convert a ciphertext intended for some person into another one designated for the other person. The proxy is viewed as a semi-trusted party and should not be able to learn any information about shared ciphertexts.

In 2007, Canetti and Hohenberger [11] presented the first Chosen-Ciphertext Attack (CCA)-secure PRE mechanism with bidirectionality allowing ciphertext conversion between both parties. Green and Ateniese [12] came up with an identity-based proxy re-encryption (IB-PRE) in the same year. Nevertheless, Weng et al. [13] pointed out that although PRE schemes had been widely used for delegated decryption, traditional PRE mechanisms could not provide fine-grained access control. To cope with this problem, they addressed the concept of conditional proxy re-encryption (C-PRE) in which ciphertexts can only be re-encrypted if received re-encryption key satisfies the predefined condition specified by its data owner. In 2009, Chu et al. [14] presented the conditional proxy broadcast re-encryption (CPBRE) to support broadcast decryption. In 2011, Shao et al. [15] proposed an IB-CPRE system suitable for the fine-grained access control over encrypted emails. In 2018, Zeng and Choo [16] introduced a sender-specified PRE (SS-PRE) which could be viewed as a variant of C-PREs. Their SS-PRE scheme restricts that a proxy can only re-encrypt ciphertexts from a specific sender. This approach effectively addresses the over-delegation problem of PRE.

In 2021, Yao et al. [17] presented a revocable proxy re-encryption scheme providing ciphertext evolution. Their scheme allows a data owner to delegate decryption rights to authorized users and periodically evolve ciphertexts to reach the goal of revoking user. In 2023, Yao et al. [18] came up with an IB-PRE system with the property of single-hop conditional delegation and supports multi-hop ciphertext evolution. Yet, both schemes fail to consider the key-escrow issue in identity-based setting. Combined with ciphertext-policy attribute-based encryption (CP-ABE), Worapaluk and Fugkeaw [19] proposed a blockchain-assisted PRE in 2023. Their scheme supports both user and attribute revocation with auditability. Nevertheless, the blockchain only stores the revoked attribute list, and thus does not achieve genuine ciphertext evolution. Moreover, their scheme lacks both formal security proofs and integrated security analyses of potential information leakage in blockchain-assisted PRE.

In 2025, Singh et al. [20] proposed a lightweight and revocable certificateless public key encryption without bilinear pairings. Although their scheme also offers the characteristic ciphertext evolution, it essentially is not a PRE mechanism and would be not well-suited for flexible data sharing in clouds. Considering the merits of certificateless public systems, Eltayieb et al. [21] proposed a certificateless PRE (CL-PRE) for data sharing in clouds. Nevertheless, their scheme only satisfies the security requirement of chosen plaintext attacks (CPA). Zhou et al. [22] further addressed a certificateless conditional PRE (CL-CPRE) scheme for data sharing in IoT clouds. Although their scheme provides the functionality of ciphertext evolution and dynamic user key-update, it achieves only CPA security and fails to support the user revocation.

Motivation and Contributions

In recent years, fog-assisted PRE schemes [2326] have gained popularity in data sharing. It enables a data owner to encrypt data and then allows a semi-honest fog node (proxy) to re-encrypt it for authorized recipients. However, existing schemes still present several limitations and research gaps:

•   Incomplete functionality in C-PRE schemes: Prior C-PRE schemes [1316] have provided fine-grained access control and hence solved the problem of over-delegation. However, they fail to consider the revocation problem and cannot support the functionality of ciphertext evolution, which is important to cloud ciphertext renewal.

•   Unresolved security issues in revocable schemes: Although the scheme introduced by Yao et al. [17] further supports the characteristics of revocability, their identity-based framework still suffers from the key-escrow problem. In a related work, Lin and Chen [23] proposed a revocable IB-PRE scheme for fog computing environments. Nevertheless, we observe that the scheme still has the over-delegation and key-escrow problems and fails to support ciphertext evolution.

To overcome these limitations and address the gaps in existing research, we propose a fog-assisted revocable C-PRE scheme with ciphertext evolution (R-CPRE-CE). Our work is motivated by the need for an integrated and secure mechanism that simultaneously solves the problem of over-delegation, revocability, ciphertext evolution, and key-escrow. The primary contributions of this paper are as follows:

•   Conditional re-encryption with user revocation: The proposed R-CPRE-CE scheme not only incorporates a predefined access condition to prevent over-delegation, but also uses a periodically updated time-key to efficiently revoke a user’s access privileges.

•   Ciphertext evolution for forward security: With ciphertext evolution, our R-CPRE-CE scheme allows cloud ciphertexts to be shared across time periods and fulfills forward security.

•   Elimination of the key-escrow problem: By employing an anonymous key generation technique, our R-CPRE-CE scheme effectively solves the inherent key-escrow problem in identity-based systems.

Although our R-CPRE-CE scheme builds upon similar concepts from previous PRE systems, it offers many advantages over the schemes of Yao et al. [17,18] and the Lin and Chen [23]. Specifically, the identity-based frameworks of Yao et al. [17,18] inherently suffer from the key-escrow problem. In contrast, the proposed R-CPRE-CE scheme eliminates this risk by employing an anonymous key generation technique. Furthermore, compared to the Lin-Chen system [23], our work provides better functionality by incorporating both conditional PRE to prevent over-delegation and a ciphertext evolution mechanism to ensure forward security. Computationally, the proposed system also demonstrates better performance, particularly in terms of the one-time access metric compared to Yao et al. [17], as detailed in Section 5.2.

The remaining parts of this paper are organized below. Section 2 briefly reviews some preliminaries in relation to the proposed scheme. We give the formal security model and definition for the proposed system in Section 3. A concrete R-CPRE-CE scheme is presented in Section 4. We analyze the security and performance of our scheme in Section 5. Finally, a conclusion is made in Section 7.

2  Preliminaries

This section introduces the essential cryptographic backgrounds and computational assumptions.

2.1 Bilinear Pairing

Let G1 and G2 be two cyclic groups of prime order p. Two generators g and g1 belong to G1. A symmetric bilinear pairing e:G1×G1G2 satisfies the following three properties:

•   Bilinearity: If gG1 and a,bZp, the equality e(ga,gb)=e(g,g)ab holds.

•   Non-degeneracy: For generators g,g1G1, we have that e(g,g1)1.

•   Computability: Let g,g1G1 and there exists a polynomial-time algorithm could calculate e(g,g1) efficiently.

2.2 The Problem of Decisional Bilinear Diffie-Hellman (DBDH)

Given (g,gf,gs,gk,γ), where g,gf,gs,gkG1, γG2, and f,s,kZp, the problem of DBDH is to determine if γ=e(g,g)fsk in which e:G1×G1G2 is a symmetric bilinear pairing.

2.3 The Assumption of Decisional Bilinear Diffie-Hellman (DBDH)

The assumption of DBDH holds if any probabilistic polynomial-time adversary 𝒜 has a negligible advantage in solving the DBDH problem. The advantage of adversary 𝒜 is defined as:

Adv(𝒜)=|Pr[𝒜(g,gf,gs,gk,e(g,g)fsk)=1]Pr[𝒜(g,gf,gs,gk,γ)=1]|ε

where ε is negligible.

3  The Proposed Scheme

This section outlines the system model, core algorithms, and security model of the proposed scheme.

3.1 System Model

The proposed R-CPRE-CE system includes three layers of participated parties and an additional Private Key Generator (PKG) for key generation. As shown in Fig. 1, the User Layer transmits the demand for ciphertext via the Proxy Layer to the Cloud Layer. Furthermore, the proxy also obtains re-encryption keys from the data owner, transforms cloud evolved ciphertexts, and forwards the result to users. In the fog computing environment, the proxy is usually composed of a group of distributed fog nodes.

images

Figure 1: The proposed R-CPRE-CE system model

3.2 Algorithm Definition

The algorithms utilized in the proposed scheme are defined as follows:

1.    Setup (1l)(PP,Msk): Given a security parameter l, it generates the system’s public parameters PP and a master secret key Msk.

2.    InitialKeyGen(PP,Msk,IDu)sku: Given PP, Msk, and a user identity IDu, this algorithm generates the user’s initial private key sku.

3.    TimeUpdateKeyGen(PP,Msk,IDu,n)tku,n: Given PP, Msk, IDu, and a time period n, this algorithm generates a corresponding time-update key tku,n.

4.    Encryption(PP,Y,IDO,skO,n,c,M)(CTDO,TK): Given PP, a symmetric key Y, a data owner’s identity IDO, his initial private key skO, a time period n, an access condition c, and a message M, this algorithm outputs the original ciphertext CTDO and an evolution parameter TK. The condition c represents a meaningful bit-string such as a keyword, a timestamp or an attribute.

5.    Query(PP,IDR,Mname)Θ: Given PP, a data user’s identity IDR, and the index of requested file Mname, this algorithm generates the corresponding query token Θ.

6.    ReKeyGen(PP,IDR,n,skO,skO,n,c,Θ)(AK,TKO,n): Given PP, an identity of data user IDR, the current time period n, the data owner’s initial private key skO and the one skO,n for the time period n, an access condition c, and the query token Θ, it generates the re-encryption key AK and a corresponding evolution parameter TKO,n.

7.    Evolve(PP,CTDO,TK,TKO,n)CTDO: Given PP, an original ciphertext CTDO, and two evolution parameters (TK, TKO,n), it calculates the evolved ciphertext (CTDO).

8.    Re-Encryption(PP,IDR,AK,CTDO)CTDR: Given PP, a data user’s identity IDR, a re-encryption key AK, and the evolved ciphertext CTDO, it computes the re-encrypted ciphertext CTDR.

9.    Decryption(PP,sku,n,CTDO/CTDR)M: It can be divided into two cases, i.e., one for the data owner and the other for the data user. In general, given PP, a private key sku,n for the current time period n, and the evolved ciphertext CTDO or the re-encrypted ciphertext CTDR, the algorithm derives the symmetric key Y to recover the message M.

Correctness: The correctness property guarantees that (1) a legitimate user holding the valid private key for the current time period n can successfully decrypt the ciphertext, and (2) a revoked user whose identity has been invalidated is unable to correctly decrypt the ciphertext. Concretely speaking, given the public parameters (PP), a symmetric key (Y), current time period (n), a user identity (IDu) with his/her initial private key (sku) and the one (sku,n) for the time period n, an access condition (c), a re-encryption key (AK), evolution parameters (TK, TKO,n), a message (M), and Rn, the set of revoked identities at time period n, the proposed system should satisfy the following conditions:

•   Correctness of decryption:

For all users whose identities have not been revoked at time period n, i.e.,  IDu Rn, the system ensures the correctness of decryption as follows:

–   Decryption by the Data Owner

(CTDO,TK)Encryption(PP,Y,IDO,skO,n,c,M)

CTDOEvolve(PP,CTDO,TK,TKO,n)

Pr[Decryption1(CTDO,skO,n)=M]=1

–   Decryption by the Data User

CTDRReEncryption(PP,IDR,AK,CTDO)

Pr[Decryption2(CTDR,skR,n)=M]=1

•   Correctness of revocation:

For all users whose identities have been revoked at time period n, i.e.,  IDuRn, the system ensures the correctness of revocation as follows:

Pr[Decryption2(CTDR,skR,n)=M]0

3.3 Security Model

This section defines the security game of indistinguishability against adaptively chosen identity and chosen ciphertext attacks (IND-PrID-CCA), where PrID stands for Proxy Identity, between a probabilistic polynomial-time (PPT) adversary 𝒜 and a challenge . We will show that the proposed system is formally proven secure in the random oracle model under the DBDH assumption.

Definition 1: (IND-PrID-CCA) If no PPT adversary 𝒜 can win the following game against a challenger with non-negligible advantage, the proposed scheme achieves IND-PrID-CCA security

GameINDPrIDCCA:

Setup. The challenger takes a security parameter l as input, runs Setup(1l) to generate public parameters PP and Msk. Then he sends PP to 𝒜.

Phase 1. The adversary 𝒜 adaptively makes polynomially many queries as follows:

–   Initial Private Key Query: 𝒜 selects an identity IDu and sends it to who runs InitialKeyGen(PP,Msk,IDu) to generate the initial private key sku which is then returned to 𝒜.

–   Time-Update Key Query: 𝒜 sends an identity IDu and a time period n to the challenger who runs TimeUpdateKeyGen(PP,Msk,IDu,n) to generate the time-update key tku,n which is then returned to 𝒜.

–   Re-Encryption Key Query: 𝒜 selects two valid user identities (IDO,IDR), a time period n, an access condition c, and an index of requested file Mname to . The challenger first runs InitialKeyGen(PP,Msk,IDO) and TimeUpdateKeyGen(PP,Msk,IDO,n) to obtain the private key skO,n for the time period n. Then runs Query(PP,IDR,Mname) to obtain a query token Θ. Finally, the re-encryption key AK could be returned to 𝒜 by performing ReKeyGen(PP,IDR,n,skO,skO,n,c,Θ).

–   Decryption Query: 𝒜 provides a valid user identity IDu and a ciphertext CTDR associated with a time period n for . The challenger first runs InitialKeyGen(PP,Msk,IDu) and TimeUpdateKeyGen(PP,Msk,IDu,n) to obtain the private key sku,n for the time period n. Then runs Decryption(PP,sku,n,CTDR) to recover M and returns it to 𝒜.

Challenge. 𝒜 defines two symmetric keys (Y0,Y1) of equal length, a target user identity ID, a time period n, an access condition c, and the message M. Then utilizes (PP,Yλ,ID,n,c,M) where λR{0,1} to generate a ciphertext CT=(C1,C2,C3,C4,CT1) and return it to 𝒜.

Phase 2. Upon getting CT, 𝒜 executes the queries of Phase 1, but the restrictions are as follows:

–   Initial private key queries for the target identity ID are disallowed.

–   Whenever 𝒜 acts as a revoked user (holds its initial private key), it cannot query a time-update key of the target period n.

–   Re-encryption key queries involving ID as an input are disallowed.

–   Decryption queries involving (ID, CT) as an input are disallowed.

–   The number of queries is bounded by qpk for initial private key queries, qtk for time-update key queries, qde for decryption queries, and qpr for re-encryption key queries.

Guess. When Phase 2 is finished, the adversary 𝒜 outputs a bit λ. If λ=λ, 𝒜 wins the game. The advantage of 𝒜 is defined as:

Adv(𝒜)=|Pr[λ=λ]12|

In the security model, we defined several query restrictions for the adversary capabilities to correctly reflect a realistic attack scenario while maintaining tractability of the security proof. For instance, in phase 2, an initial private key query for the target identity is disallowed. This is a standard assumption in IND-PrID-CCA security games, since the adversary holding the target private key can easily decrypt the ciphertext and trivially break the security. This restriction ensures that the adversary’s success advantage does not rely on possessing the target secret key. Furthermore, a decryption query involving the challenge ciphertext is disallowed. Such a restriction is crucial for modeling chosen-ciphertext attacks (CCA) where an adversary cannot directly submit the challenge ciphertext to decryption oracles. It simulates a circumstance where attackers cannot access the victim’s decryption device, but must rely on other queries to gain information.

Although these restrictions are standard in formal security models, it is important to consider their alignment with real world attack scenarios, particularly in a fog computing environment with multiple semi-trusted proxies. In practice, an adversary might compromise one or more fog nodes and attempt to use them as re-encryption or decryption oracles. Our security model implicitly addresses this by providing the adversary with more query capabilities. For instance, the adversary can request re-encryption keys for any non-challenge identity and decrypt any ciphertext except for the specific challenge ciphertext itself. This simulates a powerful attacker who has significant control over the network but has not yet compromised the specific target’s final decryption device or process. The core security of the challenge ciphertext relies on the cryptographic hardness of the underlying problem, even if the adversary can observe and manipulate other related ciphertexts through compromised proxies. To the best of our knowledge, no model can perfectly capture all real-world nuances. The IND-PrID-CCA model provides a well-accepted abstraction for demonstrating security against adaptive attacks in such distributed environments.

4  Construction of Proposed Scheme

Building upon the previously defined algorithms, we now present a concrete construction.

•   Setup(1l)(PP,Msk)

Given a security parameter l, the Private Key Generator (PKG) outputs a master secret key Msk and the public parameters PP={G1,G2,g,p,e,Mpk,H1,H2,H3,H4,E(),D()} defined as follows:

(1)   G1 and G2 are two prime-order multiplicative groups of the order p, g is a generator of G1, and e is a bilinear mapping function, e:G1×G1G2.

(2)   A random value αZp is selected and set as the master secret key, i.e., Msk=α. The master public key Mpk is then computed as Mpk=g1=gα.

(3)   H1, H2, H3, and H4 are four one-way hash functions satisfying that H1:{0,1}G1, H2:{0,1}G1, H3:{0,1}G1, and H4:G2G1.

(4)   E() and D() denote symmetric encryption and decryption functions, respectively.

•   InitialKeyGen(PP,Msk,IDu)sku

The initial private key is generated through the interactive steps:

(1)   The registering user IDu selects random values ru,ZuZp and computes:

Zu=gZu(1)

Ru=ZuH2(IDuru)(2)

(2)   IDu sends (IDu,Ru) to the PKG which then computes:

sku=Ruα=(ZuH2(IDuru))α(3)

(3)   PKG returns sku to the user IDu who will compute:

sku1=sku/g1zu=H2(IDuru)α(4)

sku2=ru(5)

(4)   The user IDu sets his/her initial private key sku=(sku1,sku2).

(5)   The sku could be further verified for correctness using the following equation:

e(sku1,g)=e(H2(IDuru),g1)(6)

•   TimeUpdateKeyGen(PP,Msk,IDu,n)tku,n

The time-update key is generated through the interactive steps:

(1)   IDu sends (IDu,n) to the PKG which then computes:

tku,n=H1(IDun)α(7)

(2)   PKG returns the time-update key tku,n to IDu.

(3)   The tku,n could be further verified for correctness using the following equation:

e(tku,n,g)=e(H1(IDun),g1)(8)

(4)   IDu finally derives the private key sku,n for the time period n as

sku,n=sku1tku,n=(H1(IDun)H2(IDuru))α(9)

•   Encryption(PP,Y,IDO,skO,n,c,M)(CTDO,TK)

Let M=(m1,m2,,ms) be a message associated with the file index Mname, Y a chosen symmetric key, and c{0,1} a predefined access condition. The Data Owner IDO selects a random value kZp to compute the original ciphertext CTDO for M as follows:

(1)   Compute

C1=Ye((H1(IDOn)H2(IDOrO))kskO2,g1)(10)

C2=gkskO2(11)

C3,n=(H1(IDOn))skO2(12)

C4=H3(IDOc)kskO2(13)

(2)   Compute an evolution parameter as

TK=g1k(14)

(3)   Set CT0=(C1,C2,C3,C4) and compute

CT1=(E(Y,m1),E(Y,m2),,E(Y,ms))(15)

(4)   Output CTDO=(CT0,CT1)

The data owner IDO will store Mname with the corresponding access condition c, and sends (IDO,n,CTDO,TK,Mname) to the proxy. Upon receiving it, the proxy keeps (IDO,Mname) and forwards (IDO,n,CTDO,TK,Mname) to the cloud for storage.

•   Query(PP,IDR,Mname)Θ

When a data user IDR requests the ciphertext stored in the cloud with respect to the file index Mname, he selects a random value ρZp to compute

Q=gρ(16)

Then (IDR,Q,Mname) is sent to the nearby proxy which generates a query token Θ=(IDR,Q) delivered to the data owner IDO.

•   ReKeyGen(PP,IDR,skO,skO,n,n,c,Θ)(AK,TKO,n)

After receiving the token Θ, IDO derives the re-encryption key AK by the following steps:

(1)   Select random values ω,x,πZp.

(2)   Compute the hash value of the access condition c as

W=H3(IDOc)(17)

(3)   Compute the re-encryption key AK=(A1,A2,A3,A4) as

A1=Wxg1ω(18)

A2=(skO,n)g1ωH4(e(H1(IDRn)Qπ,g1))(19)

A3=e(gπ,g1)(20)

A4=gx(21)

(4)   Compute the evolution parameter TKO,n for the current time period n as

TKO,n=(H1(IDOn))skO2(22)

Subsequently, the data owner sends (AK,TKO,n) to the proxy which also transmits (IDO,TKO,n,Mname) to the cloud for ciphertext evolution.

•   Evolve(PP,CTDO,TK,TKO,n)CTDO

Upon receiving (IDO,TKO,n,Mname), the cloud server (CS) searches for stored {CTDO=(CT0,CT1),TKO,n} using Mname and then

(1)   Compute

C1=C1e(TKO,n/C3,n,TK)(23)

where CT0=(C1,C2,C3,C4).

(2)   Set the evolved ciphertext as CTDO={CT0=(C1,C2,C3,C4),CT1} and deliver it to the proxy.

•   Re-Encryption(PP,IDR,AK,CTDO)CTDR

When the proxy gains the re-encryption key AK=(A1,A2,A3,A4) and TKO,n from IDO and the evolved ciphertext CTDO from the CS, it performs the re-encryption process below:

(1)   Compute C1 as

C1=C1e(A1,C2)/e(C4,A4)(24)

At this stage, the ciphertext and re-encryption key must associate with the same access condition c for the proxy to generate a valid re-encrypted ciphertext CTDR. In other words, this mechanism restricts the re-encryption privilege of the semi-trusted proxy, preventing it from illegally re-encrypting other unauthorized ciphertexts stored by the data owner in the CS.

(2)   Compute C2,C3,and C4 as

C2=C2=gkskO2(25)

C3=A2=(skO,n)g1ω/H4(e(H1(IDRn)Qπ,g1))(26)

C4=A3=e(gπ,g1)(27)

(3)   Output the ciphertext CTDR={CT0=(C1,C2,C3,C4),CT1} and send it to IDR. Fig. 2 illustrates the ciphertext evolution and re-encryption process across time periods.

images

Figure 2: Illustration of ciphertext evolution and re-encryption process across time periods

•   Decryption(PP,sku,n,CTDO/CTDR)M

The decryption process is classified into two cases. The first is performed by a data owner IDO with the following steps:

(1)   Computes the decryption key

Y=C1e(C2,skO,n)(28)

The correctness of Eq. (28) could be easily confirmed, since

C1e(C2,skO,n)=Ye((H1(IDOn)H2(IDOrO))kskO2,g1)e(gkskO2,(H1(IDOn)H2(IDOrO))α)=Y.

(2)   Recover the message M by computing

{Mi=D(Y,E(Y,mi))}i=1,,s(29)

The second is performed by the data user IDR with the following steps:

(1)   Compute the parameter E as

E=C3H4(C4ρe(skR,n,g)e(H2(IDRrR),g1))=(skO,n)g1ω(30)

(2)   Compute the decryption key

Y=C1e(E,C2)(31)

The correctness of Eq. (31) could be easily confirmed, since

C1e(E,C2)=Ye((H1(IDOn)H2(IDOrO))kskO2,g1)e(g1ω,gkskO2)e((H1(IDOn)H2(IDOrO))αg1ω,gkskO2)=Ye((H1(IDOn)H2(IDOrO))kskO2,g1)e(g1ω,gkskO2)e((H1(IDOn)H2(IDOrO))α,gkskO2)e(g1ω,gkskO2)=Y

(3)   Recover the message M with Eq. (29).

5  Security Proof and Comparison

Based on previously defined security model, this section provides the formal security proof for the proposed R-CPRE-CE scheme. Meanwhile, some comparisons with similar systems are also made.

5.1 Security Proof

We show that the proposed R-CPRE-CE system is provably secure in the security notion of IND-PrID-CCA as Theorem 1. We prove the security of our scheme using a reductionist argument in the random oracle model (ROM). The core idea is to demonstrate that if a PPT adversary can break the IND-PrID-CCA security of our scheme, then we can construct an algorithm to solve the DBDH problem, which is assumed to be computationally intractable. In the ROM, an adversary must query a random oracle for a result rather than computing it independently. This model is a widely used idealization in cryptography and can simplify the proof of complex cryptographic protocols. When instantiating the random oracles with real world hash functions like Secure Hash Algorithm 3 (SHA-3), we follow common cryptographic practices to mitigate potential attacks. Specifically, the inputs to the hash functions are carefully structured, e.g., concatenating identities with nonces or other distinct values, to prevent collision attacks and other structural vulnerabilities that could arise from a naive implementation. Thus, we believe that such an instantiation will not introduce new weaknesses into our scheme. However, a true random oracle does not exist in the real world. A ROM-proven-secure scheme could also be insecure in the standard model. Extending our current mechanism to fulfill standard model security requires significant modifications and inevitably increases the computation complexity. Consequently, we leave the adaptation to achieve standard model security as our future work.

Theorem 1: (Proof of IND-PrID-CCA)

Let H1,H2, and H3 be random oracles. Under the assumption of DBDH, the constructed R-CPRE-CE system fulfills the IND-PrID-CCA security. Concretely speaking, if there exists any PPT adversary 𝒜 breaking the IND-PrID-CCA security of our proposed scheme with a non-negligible advantage ε, under the query limits qtk, qde, and qpr, an algorithm that is able to solve the DBDH problem with the non-negligible advantage ε where

εεe(qtk+qpr+qde+1)

and e denotes the base of the natural logarithm.

Proof: Let (g,gf,gs,gk,γ) be a DBDH instance provided to , in which f,s,kZp and γG2. The proof shows how a challenger takes the advantage of adversary 𝒜 to decide whether γ equals to e(g,g)fsk or not.

Setup. The challenger first initializes Setup(1l) to generate PP={e,G1,G2,g,p,Mpk,H4,E(),D()} and sends PP to the adversary 𝒜. The master public key Mpk is defined as P=gs, and the challenger does not know Msk=s.

Phase 1. The adversary 𝒜 adaptively makes polynomially many queries as follows:

–   H1(IDun) Oracle: For any query to H1(IDun), the challenger checks the maintained H1-table, i.e., HT1 using the index (IDu,n). If not found, randomly selects a bit bt{0,1} such that Pr[bt=1]=ψ, where ψ will be decided later. If bt=0, computes HO1=(gf)s1, in which s1Zp. If bt=1, calculates HO1=gs1. Finally, HT1 is updated as HT1{(IDu,n,bt,s1,HO1)}, and HO1 is returned to 𝒜.

–   H2(IDuru) Oracle: For any query to H2(IDuru), checks the maintained H2-table, i.e., HT2 using the index (IDu,ru). If not found, calculates HO2=gs2 in which s2Zp. Finally, HT2 is updated as HT2{(IDu,ru,s2,HO2)}, and HO2 is returned to 𝒜.

–   H3(IDuc) Oracle: For any query to H3(IDuc), checks the maintained H3-table, i.e., HT3 using the index (IDu,c). If not found, calculates HO3=gs3 in which s3Zp. Finally, HT3 is updated as HT3{(IDu,c,s3,HO3)}, and HO3 is returned to 𝒜.

–   Initial Private Key Query: For any initial private key queries of an identity IDu, the challenger uses IDu as an index to search for an entry (IDu,ru,s2,HO2) in HT2. If not found, simulates a query to the random oracle H2 on behalf of 𝒜 and then computes sku1=Ps2, sku2=ru, and sku=(sku1,sku2). Finally, returns sku to 𝒜.

–   Time-Update Key Query: For any time-update key queries of (IDu,n), the challenger searches the HT1 for an entry (IDu,n,bt,s1,HO1). If not found, simulates a query to the random oracle H1 on behalf of 𝒜. If bt=0, aborts. Otherwise, it computes tku,n=Ps1 and returns it to the adversary 𝒜.

–   Re-Encryption Key Query: For any re-encryption key queries of (IDO,IDR,n,c,Mname) where IDOIDR, and IDR is a non-revoked user, simulates the H3(IDOc) oracle, the initial private key, and the time-update key queries to obtain the user private key skO,n for the time period n, and then retrieves the corresponding entries from HT1, HT2, and HT3. If bt=0, the query is aborted. If not, chooses random values ρ,ω,x,πZp to compute Q=gρ, W=HO3, A1=WxPω, A2=(skO,n)PωH4(e(H1(IDRn)Qπ,P)), A3=e(gπ,P), and A4=gx. Finally, gives the re-encryption key AK=(A1,A2,A3,A4) to 𝒜.

–   Decryption Query: For any decryption queries of (IDu,CTDR,n) where IDu is a valid user, simulates the initial private key and the time-update key queries to obtain the private key sku,n for the time period n. However, if the corresponding entry (IDu,n,bt,s1,HO1) in HT1 satisfies that bt=0, it will be aborted. Otherwise, is capable of retrieving another entry (IDu,ru,s2,HO2) from HT2 and then calculating the private key sku,n=Ps1+s2 to run the decryption algorithm and return its result to 𝒜.

Challenge. 𝒜 chooses two symmetric keys (Y0,Y1) of equal length, the target user identity IDu, a time period n, an access condition c, and the message M=(m1,m2,,ms). The challenger takes the input of (PP,Yλ,IDu,n,c,M) where λR{0,1} to generate a challenge ciphertext CT=(C1,C2,C3,C4,CT1) for the adversary 𝒜 as follows:

1.    It can be assumed, without loss of generality, that 𝒜 has already chosen a random ru and queried the corresponding random oracles of IDu. If bt=1, the challenger aborts.

2.    Otherwise, can retrieve the associated (s1,s2,s3) from maintained tables and compute

C1=Yλγs1rue((gk)s2ru,P)

C2=(gk)ru

C3=(gf)s1ru

C4=(gk)s3ru

CT1=(E(Yλ,m1),E(Yλ,m2),,E(Yλ,ms))

Phase 2. After getting the challenge ciphertext CT, the adversary 𝒜 will go on Phase 1 queries under the constraints defined in Definition 1.

Guess. At the end of Phase 2, 𝒜 outputs a bit λ. If λ=λ, the challenger outputs 1, indicating γ=e(g,g)fsk. Otherwise, it outputs 0, indicating γe(g,g)fsk.

Analysis: The confidentiality of the proposed scheme is directly guaranteed by the hardness of the DBDH assumption. The core of this proof lies in how the challenger uses the ability of adversary 𝒜 to compromise confidentiality to solve the given DBDH instance. According to the challenge phase, as long as e(g,g)fsk=γ, the generated ciphertext CT is correct, which indicates that the winning probability of 𝒜 is non-negligible. Namely, Adv(𝒜)=|Pr[λ=λ]1/2|ε. Conversely, whenever e(g,g)fskγ, the ciphertext is invalid, and 𝒜 gains no advantage in suspecting the right λ. Consequently, Adv(𝒜)=|Pr[λ=λ]|=1/2. Let Pr[Perfect] be the probability that the entire simulation game does not abort. The advantage of the challenger in solving the DBDH problem is thus given by the inequality below:

|Pr[(g,gf,gs,gk,e(g,g)fsk)=1]Pr[(g,gf,gs,gk,γ)=1]|

|(1/2+ε)1/2|Pr[Perfect]=εPr[Perfect]

To better estimate Pr[Perfect], we analyze the following event probabilities:

–   Pr[¬TkQ]: All time-update key queries are handled without aborting.

–   Pr[¬PrQ]: All re-encryption key queries are handled without aborting.

–   Pr[¬DeQ]: All decryption queries are handled without aborting.

–   Pr[¬Ch]: The challenge phase completes without aborting.

Since Pr[¬TkQ], Pr[¬PrQ], Pr[¬DeQ], and Pr[¬Ch] are independent events, the probability Pr[Perfect] can be expressed as

Pr[¬TkQ]Pr[¬PrQ]Pr[¬DeQ]Pr[¬Ch]

To be precise, in any time-update key query, terminates when bt=0, meaning Pr[¬TkQ]Ψqtk. In any re-encryption key query, terminates when bt=0, meaning Pr[¬PrQ]Ψqpr. In any decryption query, terminates when bt=0, meaning Pr[¬DeQ]Ψqde. In the challenge phase, aborts provided that bt=1, i.e., Pr[¬Ch](1Ψ). By combining these probability events, we obtain

Pr[Perfect](Ψ)qtk(Ψ)qpr(Ψ)qde(1Ψ)=(Ψ)qtk+qpr+qde(1Ψ)

By calculation, when Ψ is maximized at 11/(qtk+qpr+qde+1), the probability that the simulation process is perfect without aborting is at least 1/e(qtk+qpr+qde+1) where e is the base of natural logarithm. Therefore, the advantage ε of the challenger in breaking the problem of DBDH could be written as

εεe(qtk+qpr+qde+1). 

5.2 Comparison

This subsection presents a functional comparison and performance analysis with similar studies, including Zhang et al.’s (PRE+ for short) [26], Yao et al.’s (R-CPRE-CE+ for short) [17], Fang et al.’s (C-PRE for short) [6], Zhou et al.’s (CL-CPRE for short) [22], and the Lin-Chen (R-PRE for short) [23]. Table 1 summarizes the comparison of functionality. It can be observed that the schemes of R-CPRE-CE+ and R-PRE do not support anonymous key generation, and neither of them, including the PRE+, can resist a malicious PKG. Among the schemes of PRE+, C-PRE, CL-CPRE, and R-PRE, only the R-PRE provides the property of time-update key, and most of them could not simultaneously fulfill conditional proxy re-encryption, time-update key, and ciphertext evolution.

images

In Table 2, we focus on computational complexity and evaluate time-consuming operations. Among these mechanisms, ours and R-PRE have the same computational advantage in the generation of time-update key algorithm. In particular, our system is efficient in the Setup phase, requiring only one exponentiation (E). The C-PRE scheme has to additionally generate a strongly unforgeable one-time signature. Besides, our system is one of only three schemes to feature the Evolve function, which is crucial for forward-security or state updates. Its cost is a single pairing (B), which is significantly more efficient than the costs of R-CPRE-CE+ and CL-CPRE schemes. The Decryption (DO) cost is just B, on par with R-PRE, the most efficient scheme in this category. Although the computational complexity of ReKeyGen and Re-Encryption in our system is slightly higher than compared works, the proposed system offers a strong balance of performance and advanced features, making it a better choice for practical applications. Fig. 3 illustrates the approximate running time using the test environment of Intel Core i5-8250U CPU @ 1.60 GHz, 2.7 GB RAM, and Ubuntu 18.04.4 LTS with the Pairing-Based Cryptography (PBC) library (version 0.5.14).

images

images

Figure 3: Comparison of approximate running times

As shown in Fig. 3, R-PRE and ours only need 2.893 ms to run Setup. In the InitialKeyGen phase, our scheme takes 8.679 ms. In the TimeUpdateKeyGen phase, R-PRE and our schemes need a runtime of 2.893 ms which is better than that of 8.679 ms in R-CPRE-CE+ scheme. Our scheme is also efficient in Evolve (13.864 ms) and Decryption by DO (13.864 ms). The PRE+ scheme has the best runtime of 5.786 ms in ReKeyGen. Although the R-PRE scheme has a comparable runtime in TimeUpdateKeyGen, Encryption and Re-Encryption, they fail to provide the functionality of ciphertext evolution and anonymous key generation. Since the R-CPRE-CE+ scheme also supports user revocation and ciphertext evolution, we further make a detailed evaluation with our system in Fig. 4. Note that in the comparison of Fig. 4, we just consider core algorithms including Encryption, ReKeyGen, Evolve, Re-Encryption, and Decryption by DR. Here, we also added a one-time access metric to evaluate the total computation time required for a data user to complete the entire process from sending a query to the final decryption. From the comparison illustrated in Fig. 3, it is evident that the R-CPRE-CE+ scheme is more efficient in the ReKeyGen algorithm, which requires a runtime of only 17.358 ms compared to 45.086 ms for our proposed scheme. Nevertheless, our scheme still outperforms the R-CPRE-CE+ scheme in all other core algorithms. As for the one-time access metric, which simulates the total computation time from an initial query to the final decryption in practice, the result shows that our scheme reduces the runtime by approximately 47.05% when compared to 265.219 ms of the R-CPRE-CE+ scheme.

images

Figure 4: Comparison between the R-CPRE-CE+ and our R-CPRE-CE schemes

6  Discussion

This section discusses the practical applications and academic contributions of our proposed R-CPRE-CE scheme. We aim to highlight how our scheme addresses critical challenges in fog-assisted cloud data sharing and give a potential direction for future research.

6.1 Practical Applications

As to the assessment of our framework’s effectiveness, it is essential to consider not only runtime performance, but also its accuracy. In the context of cryptographic schemes, the concept of “accuracy” is formally defined as correctness. As shown in Section 3.2, our R-CPRE-CE scheme is well-designed and correct, because any unrevoked user holding a valid private key can decrypt the corresponding ciphertext with the probability of 1. Such a deterministic guarantee is a fundamental prerequisite for any secure encryption system and ensures the reliability of our framework. Thus, the effectiveness of our scheme is demonstrated by its proven correctness and the results of computational evaluation detailed in Section 5.2.

Concretely speaking, the proposed R-CPRE-CE scheme is designed to provide a secure and integrated data sharing mechanism for distributed systems, especially in fog-assisted clouds. In the application of healthcare management, a data owner needs to revoke the access privilege of certain data users due to privacy concerns. Our system employs a periodically updated time key to achieve this without re-encrypting the original data. For the application of intelligent transportation systems, in which data gathered from vehicles and mobile sensors must remain valid for continuous time periods, the ciphertext evolution of our scheme provides crucial benefits. Additionally, the incorporation of a predefined access condition can prevent unauthorized re-encryption by a semi-trusted proxy. This property is important for assuring data confidentiality and integrity in diverse IoT environments where data delegation has to be strictly controlled.

A crucial issue of the ciphertext evolution is its security guarantees across multiple time periods, i.e., forward and backward secrecy. The proposed R-CPRE-CE scheme is designed to ensure forward secrecy, since the compromise of a previous private key does not leak the confidentiality of current and future ciphertexts. This is because each time-update key is derived from a unique hash value. Consequently, an adversary who even obtains an old time-update key cannot derive another valid one for the subsequent period. Similarly, the backward secrecy is also fulfilled in the proposed scheme, because the compromise of a current key will not result in the successful derivation of past keys. Regarding the expressiveness of the access condition, our current construction supports a single, atomic condition c for efficiency. The framework can easily support conjunctive (AND) conditions without increasing overhead. Specifically, we can express the access condition c to be a concatenation of multiple attributes (e.g., c = “role: doctor || department: cardiology”) before it is hashed. However, supporting disjunctive (OR) conditions is non-trivial and would take significant changes in algorithms or increase ciphertext size.

6.2 Academic Contributions

From the perspective of academic contributions, our work addresses the inherent problem of key-escrow in traditional identity-based cryptosystems, such as those by Yao et al. [17,18], by employing an anonymous key generation technique. Although the existing literature has discussed the individual aspects such as revocability (e.g., the Lin-Chen [23]), ciphertext evolution (e.g., Yao et al. [17]), and conditional access control, an integrated mechanism with provable security is still lacking. The proposed R-CPRE-CE scheme successfully fulfills this goal by combining the above functionalities. Despite these contributions, we recognize that the main limitation of our current system is that it does not yet achieve standard model security and requires further efforts to reduce the computational complexity. The computational costs of the ReKeyGen and Re-Encryption algorithms in our scheme are higher than some counterparts, which warrants a deeper analysis of its impact on real-time performance. This higher cost is a trade-off for better functionalities such as conditional access and ciphertext evolution. Crucially, the most computationally intensive operation, ReKeyGen, is performed by a data owner, who typically has the sufficient computing power. The Re-Encryption task, performed by the fog node, has a quantifiable latency (approximately 27 ms in our tests) that is manageable for modern fog devices. Although this design mitigates the direct impact on the real-time responsiveness of fog nodes, a further optimization is still a key future research.

The credibility of the proposed framework would benefit from quantitative ablation studies and parameter sensitivity analyses. An ablation study analyzes the impact of performance by removing individual components such as the conditional access control or the ciphertext evolution. However, these components are integrated as the core security objectives of our scheme. For instance, the removal of conditional access control will bring back the over-delegation problem, while that of ciphertext evolution would break forward security. Therefore, our design represents an integration of essential functionalities rather than a collection of separable modules. Similarly, for parameter sensitivity analysis, the computational cost of the adopted cryptographic primitives (i.e., bilinear pairings and exponentiations) scales with the chosen security parameter. It would be a valuable future direction to make a more granular analysis across various aspects.

7  Conclusions

In this paper, we proposed a fog-assisted R-CPRE-CE system, i.e., revocable conditional proxy re-encryption scheme offering ciphertext evolution. Our scheme aims at dealing with two challenges of cloud data sharing: user revocation and cloud ciphertext evolution. The former is achieved by using a periodically updated time key while the latter is realized via an evolution parameter generated by the data owner. In addition, to further restrict the unauthorized behaviors of the malicious proxy, an access condition is incorporated with the proposed re-encryption mechanism. Specifically, we utilize anonymous key generation technique, so as to prevent the key-escrow problem of identity-based systems. From the perspective of security, we formally prove that the proposed system satisfies the security model of IND-PrID-CCA under the assumption of DBDH. Compared with previous similar studies, our scheme provides not only competitive performance, but also more comprehensive functionalities. However, there are still some limitations of our current system that would be important directions for future work. First, the underlying security proof is constructed in the random oracle model. It would be better to adapt the current mechanism for a more rigorous security proof in the standard model. Second, to appeal to more resource-constrained IoT mobile applications, the computational complexity of ReKeyGen and Re-Encryption algorithms requires further optimization. Third, to support more complex access policies, such as conjunctive and disjunctive conditions, would increase more practical applicability. Finally, conducting ablation studies and a comprehensive parameter sensitivity analysis would further enhance the robustness and credibility of our framework.

Acknowledgement: Not applicable.

Funding Statement: This work was supported in part by the National Science and Technology Council of Republic of China under the contract numbers NSTC 114-2221-E-019-055-MY2 and NSTC 114-2221-E-019-069.

Author Contributions: The authors confirm contribution to the paper as follows: Conceptualization, Han-Yu Lin and Yi-Jia Ye; methodology, Yi-Jia Ye; validation, Han-Yu Lin, Tung-Tso Tsai and Yi-Jia Ye; formal analysis, Yi-Jia Ye; resources, Tung-Tso Tsai; data curation, Yi-Jia Ye; writing—original draft preparation, Han-Yu Lin; writing—review and editing, Tung-Tso Tsai; supervision, Han-Yu Lin; funding acquisition, Han-Yu Lin. All authors reviewed the results and approved the final version of the manuscript.

Availability of Data and Materials: Not applicable.

Ethics Approval: Not applicable.

Conflicts of Interest: The authors declare no conflicts of interest to report regarding the present study.

References

1. Mell P, Grance T. The NIST definition of cloud computing. Nat Inst Stand Technol. 2011;53:1–7. [Google Scholar]

2. de Brito MS, Hoque S, Steinke R, Willner A, Magedanz T. Application of the fog computing paradigm to smart factories and cyber-physical systems. Trans Emerg Telecommun Technol. 2018;29(4):e3184. doi:10.1002/ett.3184. [Google Scholar] [CrossRef]

3. Chen Y. The application of IoT-assisted intelligent transportation system. In: Proceedings of 2023 Asia-Pacific Conference on Image Processing, Electronics and Computers (IPEC); 2023 Apr 14–16; Dalian, China. p. 317–20. doi:10.1109/IPEC57296.2023.00062. [Google Scholar] [CrossRef]

4. Chen Z, Li S, Huang Q, Wang Y, Zhou S. A restricted proxy re-encryption with keyword search for fine-grained data access control in cloud storage. Concurr Comput Pract Exp. 2016;28(10):2858–76. doi:10.1002/cpe.3754. [Google Scholar] [CrossRef]

5. Deng RH, Weng J, Liu S, Chen K. Chosen-ciphertext secure proxy re-encryption without pairings. In: Cryptology and network security. Berlin/Heidelberg, Germany: Springer; 2008. p. 1–17. doi:10.1007/978-3-540-89641-8_1. [Google Scholar] [CrossRef]

6. Fang L, Susilo W, Ge C, Wang J. Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theor Comput Sci. 2012;462(2):39–58. doi:10.1016/j.tcs.2012.08.017. [Google Scholar] [CrossRef]

7. Liang K, Liu JK, Wong DS, Susilo W. An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Computer security—ESORICS 2014. Cham, Switzerland: Springer International Publishing; 2014. p. 257–72. doi:10.1007/978-3-319-11203-9_15. [Google Scholar] [CrossRef]

8. Mizuno T, Doi H. Hybrid proxy re-encryption scheme for attribute-based encryption. In: Information security and cryptology. Vol. 302. Berlin/Heidelberg, Germany: Springer; 2010. p. 288–302. doi:10.1007/978-3-642-16342-5_21. [Google Scholar] [CrossRef]

9. Shao J, Cao Z, Liang X, Lin H. Proxy re-encryption with keyword search. Inf Sci. 2010;180(13):2576–87. doi:10.1016/j.ins.2010.03.026. [Google Scholar] [CrossRef]

10. Son J, Kim D, Hussain R, Oh H. Conditional proxy re-encryption for secure big data group sharing in cloud environment. In: 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS); 2014 Apr 27–May 2; Toronto, ON, Canada. p. 541–6. doi:10.1109/INFCOMW.2014.6849289. [Google Scholar] [CrossRef]

11. Canetti R, Hohenberger S. Chosen-ciphertext secure proxy re-encryption. In: Proceedings of the 14th ACM Conference on Computer and Communications Security; 2007 Oct 29–Nov 2; Alexandria, VA, USA. p. 185–94. doi:10.1145/1315245.1315269. [Google Scholar] [CrossRef]

12. Green M, Ateniese G. Identity-based proxy re-encryption. In: Applied cryptography and network security. Berlin/Heidelberg, Germany: Springer; 2007. p. 288–306. doi:10.1007/978-3-540-72738-5_19. [Google Scholar] [CrossRef]

13. Weng J, Deng RH, Ding X, Chu CK, Lai J. Conditional proxy re-encryption secure against chosen-ciphertext attack. In: Proceedings of the 4th International Symposium on Information, Computer, and Communications Security; 2009 Mar 10–12; Sydney, Australia. p. 322–32. doi:10.1145/1533057.1533100. [Google Scholar] [CrossRef]

14. Chu CK, Weng J, Chow SSM, Zhou J, Deng RH. Conditional proxy broadcast re-encryption. In: Information security and privacy. Berlin/Heidelberg, Germany: Springer; 2009. p. 327–42. doi:10.1007/978-3-642-02620-1_23. [Google Scholar] [CrossRef]

15. Shao J, Wei G, Ling Y, Xie M. Identity-based conditional proxy re-encryption. In: 2011 IEEE International Conference on Communications (ICC); 2011 Jun 5–9; Kyoto, Japan. p. 1–5. doi:10.1109/icc.2011.5962419. [Google Scholar] [CrossRef]

16. Zeng P, Choo KR. A new kind of conditional proxy re-encryption for secure cloud storage. IEEE Access. 2018;6:70017–24. doi:10.1109/access.2018.2879479. [Google Scholar] [CrossRef]

17. Yao S, Dayot RVJ, Kim HJ, Ra IH. A novel revocable and identity-based conditional proxy re-encryption scheme with ciphertext evolution for secure cloud data sharing. IEEE Access. 2021;9:42801–16. doi:10.1109/access.2021.3064863. [Google Scholar] [CrossRef]

18. Yao S, Dayot RVJ, Ra IH, Xu L, Mei Z, Shi J. An identity-based proxy re-encryption scheme with single-hop conditional delegation and multi-hop ciphertext evolution for secure cloud data sharing. IEEE Trans Inf Forensics Secur. 2023;18(2):3833–48. doi:10.1109/TIFS.2023.3282577. [Google Scholar] [CrossRef]

19. Worapaluk K, Fugkeaw S. An efficiently revocable cloud-based access control using proxy re-encryption and blockchain. In: 2023 20th International Joint Conference on Computer Science and Software Engineering (JCSSE); 2023 Jun 28–Jul 1; Phitsanulok, Thailand. p. 178–83. doi:10.1109/JCSSE58229.2023.10202130. [Google Scholar] [CrossRef]

20. Singh MR, Barik RK, Qurashi SN, Thokchom S, Roy DS. A novel pairing free revocable certificateless encryption with ciphertext evolution for healthcare system. IEEE Access. 2025;13:27940–51. doi:10.1109/access.2025.3533367. [Google Scholar] [CrossRef]

21. Eltayieb N, Elhabob R, Abdelgader AMS, Liao Y, Li F, Zhou S. Certificateless proxy re-encryption with cryptographic reverse firewalls for secure cloud data sharing. Future Gener Comput Syst. 2025;162(12):107478. doi:10.1016/j.future.2024.08.002. [Google Scholar] [CrossRef]

22. Zhou Y, Li Y, Liu Y. A certificateless and dynamic conditional proxy re-encryption-based data sharing scheme for IoT cloud. J Internet Technol. 2025;26(2):165–72. doi:10.70003/160792642025032602002. [Google Scholar] [CrossRef]

23. Lin HY, Chen PR. Revocable and fog-enabled proxy re-encryption scheme for IoT environments. Sensors. 2024;24(19):6290. doi:10.3390/s24196290. [Google Scholar] [PubMed] [CrossRef]

24. Lin HY, Tsai TT, Ting PY, Chen CC. An improved ID-based data storage scheme for fog-enabled IoT environments. Sensors. 2022;22(11):4223. doi:10.3390/s22114223. [Google Scholar] [PubMed] [CrossRef]

25. Lin HY, Tsai TT, Ting PY, Fan YR. Identity-based proxy re-encryption scheme using fog computing and anonymous key generation. Sensors. 2023;23(5):2706. doi:10.3390/s23052706. [Google Scholar] [PubMed] [CrossRef]

26. Zhang J, Bai W, Wang X. Identity-based data storage scheme with anonymous key generation in fog computing. Soft Comput. 2020;24(8):5561–71. doi:10.1007/s00500-018-3593-z. [Google Scholar] [CrossRef]


Cite This Article

APA Style
Lin, H., Tsai, T., Ye, Y. (2026). Evolve and Revoke: A Secure and Efficient Conditional Proxy Re-Encryption Scheme with Ciphertext Evolution. Computers, Materials & Continua, 87(1), 65. https://doi.org/10.32604/cmc.2025.073553
Vancouver Style
Lin H, Tsai T, Ye Y. Evolve and Revoke: A Secure and Efficient Conditional Proxy Re-Encryption Scheme with Ciphertext Evolution. Comput Mater Contin. 2026;87(1):65. https://doi.org/10.32604/cmc.2025.073553
IEEE Style
H. Lin, T. Tsai, and Y. Ye, “Evolve and Revoke: A Secure and Efficient Conditional Proxy Re-Encryption Scheme with Ciphertext Evolution,” Comput. Mater. Contin., vol. 87, no. 1, pp. 65, 2026. https://doi.org/10.32604/cmc.2025.073553


cc Copyright © 2026 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 305

    View

  • 73

    Download

  • 0

    Like

Share Link