Next Article in Journal
A Novel Multi-Criteria Quantum Group Decision-Making Model Considering Decision Makers’ Risk Perception Based on Type-2 Fuzzy Numbers
Previous Article in Journal
A Traffic Flow Prediction Model Based on Dynamic Graph Convolution and Adaptive Spatial Feature Extraction
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Identity-Based Broadcast Proxy Re-Encryption with Dynamic Functionality for Flexible Data Sharing in Cloud Environments

1
School of Mathematics and Statistics, Key Laboratory of Analytical Mathematics and Applications (Ministry of Education), Fujian Key Laboratory of Analytical Mathematics and Applications (FJKLAMA), Fujian Normal University, Fuzhou 350117, China
2
Fujian Zhong Xin Network Security Information Technology Co., Ltd., Fuzhou 350014, China
*
Author to whom correspondence should be addressed.
Symmetry 2025, 17(7), 1008; https://doi.org/10.3390/sym17071008
Submission received: 22 May 2025 / Revised: 19 June 2025 / Accepted: 24 June 2025 / Published: 26 June 2025
(This article belongs to the Section Computer)

Abstract

Cloud computing has witnessed widespread adoption across numerous sectors, primarily due to its substantial storage capacity and powerful computational resources. In this context, secure data sharing in cloud environments is critically important. Identity-based broadcast proxy re-encryption (IB-BPRE) has emerged as a promising solution; however, existing IB-BPRE schemes lack dynamic functionality—specifically, the ability to support user revocation and addition without updating re-encryption keys. Consequently, data owners must frequently reset and distribute these keys in response to user membership changes, leading to increased system complexity and communication overhead. In this paper, we propose an identity-based broadcast proxy re-encryption scheme with dynamic functionality (IB-BPRE-DF) to address this challenge. The proposed scheme utilizes a symmetric design of re-encryption keys to enable dynamic user updates while preserving a constant re-encryption key size. Furthermore, IB-BPRE-DF is constructed under the ( f , g , F ) -GDDHE assumption and achieves semantic security in the random oracle model. Performance evaluations demonstrate that IB-BPRE-DF significantly reduces both the communication overhead (by maintaining a constant size for the re-encryption key and re-encrypted ciphertext) and the computational burden (with near-zero computational cost for generating the re-encryption key) for resource-constrained users. This work provides a practical and scalable cryptographic solution for secure and efficient data sharing in dynamic cloud environments.

1. Introduction

Cloud computing, with its powerful computational capabilities and massive storage capacity, has become widely adopted for large-scale data processing and efficient data management, particularly in personal information systems to enhance data sharing. However, data transmitted over public networks is vulnerable to eavesdropping, and stored data may be accessed by unauthorized users. Public key encryption protects data by converting it into ciphertext, preventing unauthorized access during transmission and storage. To support secure and efficient data sharing in the cloud, systems must also ensure flexibility and fine-grained access control. Proxy re-encryption (PRE) [1] offers a promising solution by enabling secure data sharing while supporting delegated access control. In addition to cloud data sharing [2,3], PRE has also been applied in areas such as email forwarding [4] and distributed file systems [5,6].
Green and Ateniese [7] first introduced identity-based proxy re-encryption (IB-PRE), combining proxy re-encryption with identity-based encryption [8] to simplify public key infrastructure and enable flexible access control. While IB-PRE supports secure data sharing, it is inefficient in cloud scenarios involving multiple receivers. Specifically, for n receivers, the sender must generate n re-encryption keys, and the proxy must produce n ciphertexts. To overcome this limitation, Xu et al. [9] proposed identity-based broadcast proxy re-encryption (IB-BPRE), which allows a single re-encryption key to support multiple receivers, thereby reducing overhead and improving efficiency.
Dynamic user revocation and addition are common in cloud-based data sharing, requiring timely updates to user access permissions. Although identity-based broadcast proxy re-encryption (IB-BPRE) reduces the computational and communication overhead associated with generating multiple re-encryption keys, it still requires re-encryption keys to be updated whenever user membership changes. This creates a burden for data owners, who must remain online to generate new keys, especially in scenarios with frequent updates. Moreover, existing IB-BPRE schemes lack key security guarantees—if a re-encryption key is leaked, any holder can perform re-encryption. To ensure confidentiality, each updated key must be securely transmitted, further increasing overhead. Thus, dynamic user updates still incur considerable computational and communication costs due to the need for frequent key updates.
To address the aforementioned challenges, we propose an identity-based broadcast proxy re-encryption scheme with dynamic functionality (IB-BPRE-DF) that enables flexible and secure data sharing in cloud environments. The proposed scheme introduces a novel re-encryption key generation mechanism, departing from traditional designs by deriving the re-encryption key from the delegator’s private value. This results in a symmetric key structure that maintains a constant key size, regardless of dynamic changes in user membership. This approach significantly reduces computational and communication overhead while supporting efficient and secure dynamic user updates.

Contributions

As previously discussed, user revocation and addition represent common requirements in cloud-based data sharing. Considering the limited resources of user devices, operations for achieving dynamic functionality must be lightweight. In data-sharing systems, user revocation and addition can be achieved without updating or re-encrypting keys, which is our primary design objective. Specifically, the contributions of this research can be summarized as follows:
  • The proposed IB-BPRE-DF scheme ensures both flexibility and efficiency in cloud-based data sharing by maintaining a constant re-encryption key size, even under frequent user revocation and addition.
  • The proposed IB-BPRE-DF scheme employs a symmetric key structure derived from the delegator’s private value to maintain a constant key size in dynamic settings, while a dual-agent mechanism improves fault tolerance and security.
  • We provide a comprehensive security analysis of IB-BPRE-DF and conduct a detailed performance comparison with existing BPRE schemes. The results highlight the practical applicability and efficiency of the proposed scheme.

2. Related Work

2.1. Proxy Re-Encryption

Proxy re-encryption (PRE) was first introduced by Blaze et al [1]. To address the issue of costly certificate management in public key infrastructure (PKI) systems, Green and Ateniese [7] proposed the identity-based proxy re-encryption, which integrates the concept of identity-based encryption with PRE. Since its inception, extensive research [10,11,12,13] has been dedicated to constructing proxy re-encryption schemes with diverse properties to satisfy varying application requirements. However, traditional PRE schemes often encounter challenges in efficiently delegating authority to multiple receivers. Specifically, the number of re-encryption keys and re-encryption ciphertexts grows with the number of receivers.

2.2. Broadcast Proxy Re-Encryption

Broadcast encryption is a cryptographic primitive that allows a sender to encrypt a message for a subset S of authorized receivers over a broadcast channel, such that only receivers in the subset S can decrypt the broadcast using their respective private keys [14]. Building on this concept [15,16], Chu et al. [17] proposed conditional broadcast proxy re-encryption, enabling a sender to delegate decryption rights to a specific subset of users. In this scheme, the proxy cannot re-encrypt ciphertexts without the sender’s explicit authorization. Xu et al. [9] subsequently proposed a conditional identity-based broadcast proxy re-encryption scheme with constant-length re-encrypted ciphertexts, which is well suited for cloud email systems. Building on this, Sun et al. [18] designed a broadcast proxy re-encryption scheme tailored for cloud computing environments (e.g., cloud data sharing) and proved its security against chosen-ciphertext attacks. Existing broadcast proxy re-encryption schemes [9,18] enable the delegation of decryption rights to a subset of receivers at a specific time. However, these schemes impose substantial computational burdens on resource-constrained mobile devices. To address this limitation, Sumana et al. [19] proposed a privacy-preserving identity-based broadcast proxy re-encryption scheme aimed at reducing decryption overhead. More recently, Zhang et al. [20] introduced an IB-BPRE scheme tailored for flexible data sharing in VANETs. The work in [21] introduced identity-based threshold BPRE to incorporate multiple proxies, thereby effectively resisting single-point attacks. Subsequently, the studies in [22,23] proposed pairing-free BPRE for application in vehicular networks and cloud data-sharing environments, respectively, thereby enhancing data-sharing efficiency. Although the aforementioned BPRE schemes have achieved improvements in terms of efficiency and security, they exhibit limited flexibility. This limitation stems primarily from their design for static environments, without adequately addressing user revocation and addition in dynamic settings.

2.3. Revocable Proxy Re-Encryption

Ge et al. [24] proposed a revocable identity-based broadcast proxy re-encryption scheme for cloud-based data sharing, enabling the proxy to revoke a subset of receivers authorized by the delegator. However, the scheme imposes significant computational overhead on receivers, particularly those operating on resource-constrained mobile devices. Maiti et al. [25] proposed a coalitional game-based BPRE scheme that efficiently updates re-encryption keys for an optimal number of users in dynamic environments. Nevertheless, the recipient set needs to be predetermined prior to the generation of re-encryption keys. Recently, the study in [26] achieved efficient computation and communication among multiple sets of broadcast receivers by introducing a multi-channel BPRE scheme. However, to enable ciphertext transformation among different sets of broadcast receivers, it is necessary to configure multiple re-encryption keys, which introduces additional computational overhead. Subsequently, Chen et al. [27] designed a conditional identity-based broadcast proxy re-encryption scheme with anonymity and revocation, which is capable of simultaneously optimizing multiple performance metrics. Nevertheless, this scheme also encounters the challenge of re-encryption key updates. It is worth noting that existing BPRE and revocable (or dynamic) BPRE schemes demonstrate limitations when applied to data sharing in dynamic environments. The primary reason is that, with frequent user updates, the data owner must remain continuously online to update re-encryption keys in real time, thereby achieving dynamic functionality. This requirement substantially increases system overhead and diminishes the practical feasibility of the scheme in real-world scenarios.
This paper is organized as follows: Section 2 presents the related work. Section 3 offers a rigorous definition of bilinear maps and computational complexity, along with the formal definition and security model of the IB-BPRE-DF scheme. Section 4 elaborates on the concrete construction of the proposed IB-BPRE-DF scheme. Section 5 and Section 6 provide the security proof and performance analysis, respectively. Finally, Section 7 concludes this paper and outlines potential future research directions.

3. Preliminaries

We first give a strict definition of the bilinear map and then elaborate on the complexity assumption relied upon for the security proofs in detail.

3.1. Bilinear Map

For cyclic groups G 1 , G 2 , and G T of the large prime order p, a bilinear pairing is a function e : G 1 × G 2 G T that maps pairs of elements in ( G 1 , G 2 ) to elements of the group G T . The map e must satisfy the following properties:
  • Bilinear: For all u G 1 , v G 2 , and a , b Z p , it holds that e u a , v b = e ( u , v ) a b .
  • Non-degenerate: There exist g 1 G 1 and g 2 G 2 such that e g 1 , g 2 1 .
  • Computable: The map e is efficiently computable and so are the group operations in G 1 , G 2 , and G T .
There are two forms of pairings used in the cryptography literature [28]. In the symmetric setting, it holds that G 1 = G 2 , whereas in the asymmetric setting, G 1 G 2 . The IB-BPRE-DF scheme adopts a symmetric bilinear pairing G 1 = G 2 = G , fully exploiting the characteristics of its symmetric form. Bilinear pairings provide the mathematical foundation for designing the IB-BPRE-DF structure, enabling the implementation of complex access control and authorization mechanisms.

3.2. Complexity Assumption

The ( f , g , F ) -GDDHE) assumption [29] is explained as follows: Let B = ( p , G 1 , G 2 , G T ,   e ( · , · ) ) be a bilinear map group system and let f and g be two coprime polynomials with pairwise distinct roots of respective orders t and n. Let g 0 be a generator of G 1 and h 0 be a generator of G 2 . Solving the ( f , g , F ) -GDDHE problem, vector y is
g 0 , g 0 γ , , g 0 γ t 1 , g 0 γ · f ( γ ) , g 0 k γ · f ( γ ) , h 0 , h 0 γ , , h 0 γ 2 n , h 0 k · γ · f ( γ ) ,
and T G T ; non-probabilistic polynomial-time adversary A can decide whether T is equal to e g 0 , h 0 k · f ( γ ) or to some random element of G T with a non-negligible advantage. The ( f , g , F ) -GDDHE assumption underpins the scheme’s security by preventing attackers without legitimate keys from recovering plaintext or private keys from ciphertext or re-encryption keys, thus ensuring data confidentiality during proxy re-encryption.

3.3. Definition and Security Model

As illustrated in Figure 1, the IB-BPRE-DF scheme is applied to cloud-based data sharing involving three primary entities: data owners, data users, and proxies. The process proceeds as follows: the data owner first encrypts the data and outsources the ciphertext to the cloud server to preserve data confidentiality. To enforce access control, the data owner then generates the re-encryption key. The proxies use the re-encryption key and the original ciphertext to produce a re-encrypted ciphertext, which authorized users can decrypt to access the data. In dynamic settings, when user updates occur, the same re-encryption key allows the proxies to transfer the ciphertext into the re-encryption ciphertext for authorized updated users, eliminating the need for frequent key regeneration and thus supporting efficient dynamic access control. The definition of IB-BPRE-DF, along with its correctness and security, is elaborated upon below.

3.3.1. Definition of IB-BPRE-DF

Definition 1
(IB-BPRE-DF). An IB-BPRE-DF scheme comprises the following algorithms: the setup algorithm, the key extract algorithm, the encryption algorithm (abbreviated as Enc), the re-encryption key generation algorithm (abbreviated as RKeyGen), the re-encryption algorithm (abbreviated as Re-Enc), and the decryption algorithms (abbreviated as Dec1 and Dec2). These algorithms are formally defined as follows:
  • Setup  1 k , n m s k , m p k . The trusted key generation center (KGC) executes the setup algorithm to establish the master secret key ( m s k ) and the master public key ( m p k ). It takes as inputs a system security parameter 1 k and the maximum number n of broadcast receivers allowed in a single re-encryption process and outputs a key pair ( m p k , m s k ) .
  • Extract m p k , m s k , i d s k i d . The KGC executes the extract algorithm to generate the secret key s k i d for the user i d . It takes as inputs the master public key m p k , the master secret key m s k , and the identity i d and outputs the corresponding secret key s k i d .
  • Enc m p k , i d , m c 0 , s v i d . The delegator i d executes the Enc algorithm to generate the ciphertext c 0 for the message m. It takes as the input the master public key m p k , an identity i d , and the message m and outputs the ciphertext c along with the secret value s v i d (note that the secret value s v i d is selected and stored by the delegator during the initial execution of the encryption algorithm).
  • RKeyGen m p k , s v i d r k . The delegator i d performs the RKeyGen algorithm to generate the re-encryption key r k . It takes as inputs the master public key m p k and the secret value s v i d of the delegator i d and outputs the re-encryption key r k .
  • ReEnc  ( m p k , r k , c 0 , S j ) c j . Proxies execute the ReEnc algorithm to transform the ciphertext c 0 under the delegator into the ciphertext c , associated with the set S of broadcast receivers, for 1 j , where denotes the number of dynamic user updates. The algorithm takes as inputs the master public key m p k , the re-encryption key r k , and the ciphertext c 0 corresponding to the delegator and outputs the ciphertext c corresponding to the receiver set S .
  • Dec1 m p k , s k i d , c 0 m / . The delegator i d executes the Dec1 algorithm to decrypt the ciphertext c 0 . Upon input of the master public key m p k , the delegator’s secret key s k i d , and a ciphertext c 0 , if the ciphertext is valid, the algorithm returns the message m; otherwise, it outputs an error symbol ⊥.
  • Dec2 m p k , c j , s k i d , S j m / . The receiver i d in the receiver set S j , where 1 j , executes the Dec2 algorithm to decrypt the ciphertext c j . It takes as inputs the master public key m p k , the ciphertext c j associated with the receiver set S j , and the private key s k i d of the receiver i d in the receiver set S j . If the re-encryption ciphertext is valid, the algorithm returns the message m; otherwise, it outputs an error symbol ⊥.
Correctness. We say that the IB-BPRE-DF scheme is correct if it satisfies the following two equations:
  • Dec 1 m p k , s k i d , Enc ( m p k , m , i d ) = m , where i d S j , 1 j .
  • Dec 2 m p k , c j , S j , s k i d , ReEnc ( m p k , r k , c 0 , S j ) = m , where i d S j , 1 j .

3.3.2. Security Model

We formally define the indistinguishability under the chosen-plaintext attack (CPA) security of the IB-BPRE-DF system against a probabilistic polynomial-time adversary A . This security notion is captured through a game played between the adversary A and a challenger C . In this game, C simulates the execution environment for the IB-BPRE-DF scheme and provides responses to queries issued by A :
  • Init. The adversary A selects a challenge identity set S j * = { i d j 1 * , i d j 2 * , , i d j s * } , with 1 j ; s n .
  • Setup. The challenger C generates the system public parameters p p and subsequently provides it to the adversary A .
  • Query phase 1. At this stage, the adversary’s capabilities are formally defined, including the allowable queries for key extraction and re-encryption key generation. The adversary A makes the following queries:
    For an extraction query O s k ( i d j i ) , subject to the constraint that i d j i S j * , the challenger C executes the extract algorithm to generate the secret key s k i d j i . Subsequently, C provides the secret key s k i d j i to the adversary A .
    For a re-encryption key query O r k g ( i d j i ) , upon receiving an identity i d j i , the challenger C executes the re-encryption key generation algorithm to generate the re-encryption key r k . Subsequently, C provides the re-encryption key r k to the adversary A .
  • Challenge. The adversary A outputs two messages m 0 , m 1 M . Subsequently, the challenger C selects a random bit a { 0 , 1 } and encrypts the message m a under the challenge set S j * . The resulting re-encryption ciphertext c j * is then provided to the adversary A . During the challenge phase of the IND-CPA game, the challenger generates a ciphertext that is computationally indistinguishable from a real ciphertext, ensuring the adversary A cannot distinguish between the two with a non-negligible advantage.
  • Query phase 2. A continues making queries as in query phase 1. Note that A cannot make query O s k i d j i for i d j i S j * . In query phase 2, the adversary is explicitly allowed to continue making queries even after receiving the challenge ciphertext.
  • Guess. The adversary A outputs a guess a { 0 , 1 } and succeeds in the game if a = a . Let A d v I B B P R E D F A ( λ ) denote the advantage of an adversary A in winning the game, defined as follows:
    A d v I B B P R E D F A ( λ ) = Pr | [ a = a ] 1 / 2 | .
Definition 2.
The IB-BPRE-DF scheme is said to be semantically secure under the IND-CPA notion if the advantage A d v I B B P R E D F A ( λ ) is negligible.

4. Proposed IB-BPRE-DF

In this section, we formally define the concrete construction of the proposed IB-BPRE-DF scheme and provide a rigorous correctness analysis. The overall architecture and the high-level interactions among the participating entities are depicted in Figure 2. In the IB-BPRE-DF scheme, the key generation, encryption, and decryption algorithm are largely consistent with those of existing BPRE schemes. The novelty of IB-BPRE-DF lies in the use of two cooperating proxies for re-encryption and a distinctive re-encryption key management approach. Specifically, the delegator generates a re-encryption key and splits it into two components, r k 1 and r k 2 , which are distributed to proxy 1 and proxy 2, respectively. Proxy 1 uses r k 1 to compute a partial re-encryption ciphertext c j , 1 , which is then forwarded to proxy 2. Upon receiving c j , 1 , proxy 2 combines it with r k 2 to compute the re-encryption ciphertext c j , which can be correctly decrypted by authorized users to recover the plaintext m.

4.1. Our Techniques

In contrast to existing IB-BPRE schemes [18,19,20,24], which necessitate re-encryption key updates for user revocation or addition, the dynamic mechanism introduced in this paper enables seamless user updates without altering the re-encryption key. In this section, we provide a concise overview of our primary implementation techniques. Consider the re-encryption ciphertext c 1 , corresponding to a broadcast receiver set S 1 = { i d 1 , i d 2 , i d 3 } , which includes the term h ( k 0 + k 1 + r * + t * ) · ( γ + H ( i d 1 ) ) · ( γ + H ( i d 2 ) ) · ( γ + H ( i d 3 ) ) . Similarly, the re-encryption ciphertext c 2 , associated with an updated receiver set S 2 = { i d 1 , i d 2 , i d 3 } , includes the term h ( k 0 + k 2 + r * + t * ) · ( γ + H ( i d 1 ) ) · ( γ + H ( i d 2 ) ) · ( γ + H ( i d 3 ) ) . In this context, the proxies P 1 and P 2 assist in generating these components by leveraging their respective partial re-encryption keys t 1 and t 2 , such that the re-encryption key is defined as r k = t 1 + t 2 . This construction ensures that ciphertexts corresponding to different receiver sets can be generated in a consistent format using the same re-encryption key while preserving data privacy—since neither proxy gains access to sensitive information.

4.2. Construction

We formally present the construction of IB-BPRE-DF with constant-size re-encryption keys, which comprises the following algorithms:
  • Setup algorithm. The key generation center, acting as the trusted party, generates the master secret key and public key pair ( m s k , m p k ) by executing the setup algorithm.
    Setup  1 λ , n m s k , m p k . It takes as inputs the system’s security parameter 1 λ and the maximum number n of receivers in a single re-encryption and outputs a pair of master keys ( m s k , m p k ) . Given a bilinear map parameter B = ( q , G , G T , e ( · , · ) ) and a cryptographically secure function H : { 0 , 1 } * Z q * modeled as a random oracle for security analysis, it randomly selects two generators g G and h G , as well as a secret value γ Z q * . The master secret key is defined as m s k = ( g , γ ) , and the master public key is defined as m p k = ( B , H , w , v , h , h γ , , h γ n ) , where w = g γ and v = e ( g , h ) .
  • Extract algorithm. The KGC generates the secret key for the user i d by executing the extract algorithm.
    Extract  m s k , i d ( s k i d ) . It takes as inputs the master secret key m s k and the identity i d and outputs the corresponding secret key:
    s k i d = g 1 γ + H ( i d ) .
  • Encryption algorithm. The delegator i d encrypts the message m by executing the encryption algorithm.
    Enc  m p k , m , i d c , s v i d . The delegator i d randomly selects k 0 , r * , and t * from Z q * , sets the secret value s v i d = ( r * , t * ) , and computes the ciphertext c 0 = { c 0 1 , c 0 2 , c 0 3 , c 0 4 } and p v = v r * as the public parameter, where
    c 0 1 = k 0 + r * , c 0 2 = w k 0 + r * + t * , c 0 3 = m · v k 0 + t * , and c 0 4 = h k 0 + r * + t * · γ + H i d · γ + H i d .
    Note that ciphertext c 0 mainly consists of four parts c 0 1 , c 0 2 , c 0 3 , and c 0 4 , each of which is calculated by the client.
  • Re-encryption key algorithm. The delegator i d performs the re-encryption key algorithm to set the re-encryption key.
    RKeyGen  s v i d , i d r k . Given the secret value s v i d of the delegator i d , it partitions t * into t 1 * and t 2 * such that t * = t 1 * + t 2 * , and sets the re-encryption key r k = ( r k 1 , r k 2 ) , where r k 1 = t 1 * and r k 2 = t 2 * . Finally, the delegator transmits r k 1 and r k 2 to proxies P 1 and P 2 , respectively, via the secure channel.
  • Re-encryption algorithm. The proxies P 1 and P 2 generate the re-encryption ciphertext via executing the re-encryption algorithm.
    ReEnc  ( m p k , r k , c 0 , S j ) c j . Assume for notational simplicity that S j = i d j 1 , , i d j s , where 1 j and s n . The proxy P 1 randomly selects k j , 1 Z q * and computes partial re-encryption ciphertext c j , 1 = ( c j , 1 1 , c j , 1 2 , c j , 1 3 ) , where
    c j , 1 1 = c 0 2 · w k j , 1 , c j , 1 2 = c 0 3 · v k j , 1 , and c j , 1 3 = c 0 1 + t 1 * + k j , 1 ,
    and sends it to the proxy P 2 . After receiving partial re-encryption ciphertext c j , 1 , the proxy P 2 randomly chooses k j , 2 Z q * and computes the re-encryption ciphertext c j = ( c j 1 , c j 2 , c j 3 ) , where
    c j 1 = c j , 1 1 · w k j , 2 , c j 2 = c j , 1 2 · v k j , 2 , and c j 3 = h c j , 2 3 + t 2 * + k j , 2 · i = 1 s γ + H i d j i .
    We have c j 1 = w k 0 + k j + r * + t * , c j 2 = m · v k 0 + k j + t * , and c j 3 = h k 0 + k j + r * + t * · i = 1 s γ + H i d j i , where k j = k j , 1 + k j , 2 .
  • Decryption algorithm. The users (i.e., the delegator and receivers) perform the decryption algorithm to recover the plaintext m.
    Dec1 m p k , p v , s k i d , c 0 m / . For a ciphertext c 0 , the delegator i d with the corresponding private key s k i d = g 1 γ + H ( i d ) computes
    K = e c 0 2 , h · e s k i d , c 0 4 1 H i d ,
    then computes v k 0 + t * = K p v and m = c 0 3 v k 0 + t * .
    Dec2 m p k , p v , s k i d j i , c j m / . For the re-encryption ciphertext c j , the receiver with identity i d j i in S j and the corresponding private key s k i d j i = g 1 γ + H ( i d j i ) computes
    K = e c j 1 , h p i d j i , S ( γ ) · e s k i d j i , c j 3 1 k = 1 , k i s H i d j k ,
    with
    p i d j i , S ( γ ) = 1 γ · k = 1 , k i s γ + H i d j k k = 1 , k i s H i d j k ,
    then computes v k 0 + k j + t * = K p v and m = c j 2 v k 0 + k j + t * .
In the dynamic setting, the IB-PRE-DF scheme employs a symmetric form of re-encryption keys. Specifically, if data owner Alice intends to share data with the broadcast receiver set S 1 and the updated set S 2 , she can generate the re-encryption key r k A S 1 for S 1 and the re-encryption key r k A S 2 for S 2 , where r k A S 1 = r k A S 2 . This symmetric form of re-encryption keys effectively minimizes the computational overhead associated with re-encryption key generation in dynamic settings.

4.3. Correctness

(1)
For the ciphertext c 0 , the delegator i d computes
K = e c 0 2 , h · e s k i d , c 0 4 1 H ( i d ) = e g k 0 + r * + t * · γ , h · e g 1 γ + H i d , h k 0 + r * + t * · γ + H i d · γ + H i d 1 H ( i d ) = e ( g , h ) k 0 + r * + t * · γ · e ( g , h ) k 0 + r * + t * · γ + H i d 1 H ( i d ) = e ( g , h ) k 0 + r * + t * H i d 1 H ( i d ) = e ( g , h ) k 0 + r * + t *
In the decryption algorithm, the entire decryption process is systematically divided into three steps. For Equation (1), the parameter K is obtained by combining the secret key s k i d j i , the ciphertexts c 0 1 and c 0 3 , and the public parameter h and then computing
v k 0 + t * = K p v = e ( g , h ) k 0 + r * + t * e ( g , h ) r * .
For Equation (2), based on the intermediate parameter K and the public parameter p v , further operations are performed to calculate v k 0 + t * . We have
m = c 0 3 v k 0 + t * = m · e ( g , h ) k 0 + t * e ( g , h ) k 0 + t * = m .
For Equation (3), the data m is finally recovered by using the ciphertext c j 2 and the parameter v k 0 + t * obtained by Equation (2).
(2)
For the re-encryption ciphertext c j , the receiver with identity i d j i in S j computes
K = e c j 1 , h p i d j i , S ( γ ) · e s k i d j i , c j 3 1 k = 1 , k i s H i d j k = e g k 0 + k j + r * + t * · γ , h p i d j i , S ( γ ) · e g 1 γ + H i d j i , h k 0 + k j + r * + t * · k = 1 s γ + H i d j k 1 k = 1 , k i s H i d j k = e ( g , h ) k 0 + k j + r * + t * · k = 1 , k i s H i d j k 1 k = 1 , k i s H i d j k = e ( g , h ) k 0 + k j + r * + t *
In the decryption algorithm of re-encryption ciphertext c j , the entire decryption process is divided into three steps. For Equation (4), the parameter K is obtained by combining the secret key s k i d j k , the ciphertexts c j 1 and c j 3 , and the public parameter h p i d j i , S ( γ ) and then computing
v k 0 + k j + t * = K p v = e ( g , h ) k 0 + k j + r * + t * e ( g , h ) r * .
For Equation (5), based on the intermediate parameter K and the public parameter p v , further operations are performed to calculate v k 0 + k j + t * . We have
m = c j 2 v k 0 + k j + t * = m · e ( g , h ) k 0 + k j + t * e ( g , h ) k 0 + k j + t * = m .
For Equation (6), the data m is finally recovered by using the ciphertext c j 2 and the parameter v k 0 + k j + t * obtained by Equation (5).
From the above verification procedure, we conclude that the IB-BPRE-DF scheme satisfies the correctness property, as all operations produce the expected outputs under the defined system parameters and algorithms.

5. Security Proof

In this section, we formally prove that the IB-BPRE-DF scheme achieves CPA security. The detailed security analysis and proof are provided below to rigorously demonstrate the security of the IB-BPRE-DF scheme.
Theorem 1.
The IB-BPRE-DF scheme proposed in Section 4 is provably secure against chosen-plaintext attacks. Specifically, it achieves CPA security for re-encryption ciphertexts under the decisional ( f , g , F ) -GDDHE assumption, within the random oracle model.
Proof of Theorem 1. 
Suppose there exists a probabilistic polynomial-time adversary A that can attack the IB-BPRE-DF scheme described in Section 3 with a non-negligible advantage ϵ . We build a PPT adversary B that uses A as a subroutine to solve the f , g , F -GDDHE assumption in G with advantage ϵ . Let n be the maximum number of receivers included in a single re-encryption operation, and let t be the total number of queries made by A , including key extraction, hash, and re-encryption key queries. Algorithm B is provided with a bilinear group system B = p , G 1 , G 2 , G T , e ( · , · ) and a decisional ( f , g , F ) -GDDHE challenge instance y defined as follows:
g 0 , g 0 γ , , g 0 γ t 1 , g 0 γ · f ( γ ) , g 0 k · γ · f ( γ ) , h 0 , h 0 γ , , h 0 γ 2 n , h 0 k · g ( γ ) ,
as well as T G T , which is either equal to e g 0 , h 0 k · f ( γ ) or to a random element of G T . We first define some notations as follows:
-
f ( X ) = i = 1 t X + x j i , g ( X ) = i = t + 1 t + n X + x j i , for j [ 1 , ] .
-
f j i ( x ) = f ( x ) x + x j i for i [ 1 , t ] and j [ 1 , ] , which is a polynomial of degree t 1 .
-
g j i ( x ) = g ( x ) x + x j i for i [ t + 1 , t + n ] and j [ 1 , ] , which is a polynomial of degree n 1 .
These notations f ( X ) , f j i ( x ) , and g j i ( x ) are mainly used to construct simulation schemes, thereby making the simulation schemes indistinguishable from the real ones in terms of functionality and performance.
The above process first assumes that adversary A has certain capabilities (i.e., it can break the proposed scheme IB-BPRE-DF with a non-negligible advantage ϵ ). Based on this, adversary B takes a decisional ( f , g , F ) -GDDHE challenge instance y as the input to simulate the scheme and interact with A . If A succeeds, B can solve the ( f , g , F ) -GDDHE problem, thereby establishing the security of IB-BPRE-DF under this assumption.
  • Init. The adversary A outputs a set S j * = i d j 1 * , , i d j s * , of identities that they intend to attack, where s n .
  • Setup. To generate the system parameters p p , B formally sets g = g 0 f ( γ ) (i.e., without computing it) and randomly selects r * Z and then sets
    h = h 0 i = t + s + 1 t + n γ + x j i , w = g 0 γ · f ( γ ) = g γ , v = e g 0 , h 0 f ( γ ) · i = t + s + 1 t + n γ + x j i = e ( g , h ) , p v = v r * .
    B defines the system parameters as p p = ( w , v , p v , h , h γ , , h γ n ) . Subsequently, B sends p p and B = p , G 1 , G 2 , G T , e ( · , · ) to A , where H is a random oracle controlled by B and is described below.
  • Hash queries. At any point during the game, the adversary A may issue a hash query to the random oracle on an identity i d j i , up to a total of t q e q r times, where q e and q r denote the number of key extraction and re-encryption key queries, respectively. To respond to these queries, B maintains a list L H of tuples of the form ( i d j i , x j i , s k i d j i ) . Initially, this list includes
    , x j i , i = 1 t   and   i d j i , x j i , i = t + 1 t + s ,
  • where “∗” denotes an empty entry. Upon receiving a hash query for an identity i d j i , the challenger proceeds as follows:
    1.
    If i d j i already exists in the list L H , B sets the corresponding value x j i .
    2.
    Otherwise, B sets H i d j i = x j i , appends ( i d j i , x j i , ) to L H , and returns x j i to the adversary.
  • Query phase 1.
    Extraction query  i d j i . Upon receiving an extraction query for an identity i d j i S j * , the challenger B proceeds as follows:
  • -
    If an extraction query for i d j i has already been made, B returns the corresponding private key sk i d j i from the list L H .
    -
    If a hash query has been previously issued for i d j i , B retrieves the corresponding x j i and computes the private key as
    sk i d j i = g 0 f j i ( γ ) = g 1 γ + H i d j i .
    We use a random oracle H to simulate the generation of private keys, ensuring that no real key is leaked.
    Re-encryption key generation query i d j i . When A issues a re-encryption key generation query, B performs the RKeyGen algorithm to set the re-encryption key r k = t * , where the value t * is uniformly sampled from Z q * .
  • Challenge. When A decides that phase 1 is over, algorithm B computes the encrypt algorithm to obtain c * = Encrypt S j * , p p , as shown below:
    c j 1 = g 0 ( k ) · γ · f ( γ ) , c j 3 = h 0 k · q ( γ ) ,
    c j 2 = m b · ( e ( g 0 , h 0 ) f ( γ ) · i = t + s * + 1 t + n ( γ + x j i ) ) k · ( e ( g 0 , h 0 ) f ( γ ) · i = t + s * + 1 t + n ( γ + x j i ) ) r * ,
    with q ( γ ) = 1 γ · i = t + s + 1 t + n γ + x j i i = t + s + 1 t + n x j i . One can verify that
    c j 1 = w k , c j 3 = h 0 k · i = t + s + 1 t + n γ + x j i · i = t + 1 t + s γ + x j i = h k · i = t + 1 t + s γ + H i d j i * ,
    c j 2 = m b · ( e ( g 0 , h 0 ) f ( γ ) · i = t + s + 1 t + n ( γ + x j i ) ) k · ( e ( g 0 , h 0 ) f ( γ ) · i = t + s + 1 t + n ( γ + x j i ) ) r * = m b · v k r * .
    We observe that c * = ( c j 2 , c j 3 , c j 4 ) is a valid challenge ciphertext when T = e g 0 , h 0 k · f ( γ ) . When T is a random value in G T , the challenge ciphertext c * appears independent of b from the adversary’s view. The challenge ciphertext c * constructed by adversary B either conforms to the ciphertext structure of the proposed scheme or is generated at random, making it indistinguishable from adversary A under the given security assumptions.
  • Query phase 2. A continues to make queries as in query phase 1 while strictly adhering to the constraints imposed by the indistinguishable game.
  • Guess. In the guessing phase, the adversary A ’s success probability in distinguishing the challenge ciphertext c * is used to derive a non-negligible advantage in solving the underlying hard problem (the decisional ( f , g , F ) -GDDHE), thereby reinforcing the security reduction. A outputs a guess b { 0 , 1 } . If b = b , B outputs 1, this indicates that T = e g 0 , h 0 k · f ( γ ) ; otherwise B outputs 0, indicating that T is a random element in G T . This concludes the simulation. We now analyze the probability that the adversary B solves the decisional ( f , g , F ) -GDDHE assumption. If T e g 0 , h 0 k · f ( γ ) , the view of A is independent of the bit b, implying that Pr B ( y , T ) = 1 T e g 0 , h 0 k · f ( γ ) = 1 2 . Conversely, if T = e g 0 , h 0 k · f ( γ ) , the adversary B s output is dependent on A s behavior, yielding Pr B ( y , T ) = 1 T = e g 0 , h 0 k · f ( γ ) = 1 2 + ϵ . Consequently, the advantage ϵ of B in solving the decisional ( f , g , F ) -GDDHE assumption is ϵ = Pr [ B ( y , T ) = 1 T = e g 0 , h 0 k · f ( γ ) Pr B ( y , T ) = 1 T e g 0 , h 0 k · f ( γ ) | = | 1 2 + ϵ 1 2 = ϵ . This concludes the proof of Theorem 1, thereby establishing the IB-BPRE-DF is CPA secure.
 □

6. Performance Analysis

This section presents a comprehensive performance analysis of the proposed scheme from both theoretical and experimental perspectives.

6.1. Theoretical Analysis

A Comparison of the IB-BPRE-DF and IB-BPRE Schemes in [18,19,20,24]. Firstly, we define the notations used in Table 1, Table 2, Table 3 and Table 4 and align with those introduced in [19,24]. Let | p p | , | c t | , | r t | , and | c t | denote the sizes of the public parameter, ciphertext, re-encryption key, and re-encryption ciphertext, respectively. The variables n, k, and | S | denote the maximum number of receivers in a single re-encryption, the number of revoked users, and the size of a broadcast receiver set S, respectively. Denote t e , t p , and t h as the computational costs for a modular exponentiation, a bilinear pairing operation, and a hash operation, respectively. | G | , | Z p | , and | H | represent the bit lengths of an element in G , Z p , and H , respectively. To simplify the discussion, we uniformly represent all groups involved in the schemes [18,19,20,24] by the symbol G , all prime fields by the symbol Z p , and all hash functions by the symbol H .
Feature Comparisons of IB-BPRE Schemes. Table 1 provides a summary of the feature metrics for the proposed IB-BPRE-DF scheme. These metrics are compared with those of relevant schemes [18,19,20,24]. The results indicate that the IB-BPRE-DF scheme achieves distinctive properties such as dynamic functionality, revocation functionality, and maintaining constant-size re-encryption keys. In contrast, some existing schemes struggle to effectively maintain these properties simultaneously. For instance, the BPRE schemes in [18,19,20] fail to support dynamic functionality while keeping re-encryption keys of a constant size. Additionally, the BPRE schemes in [24] require the proxy to achieve revocation by updating re-encryption keys.
Efficiency Comparisons of IB-BPRE Schemes. In Table 2 and Table 3, we present a comprehensive comparison between the IB-BPRE-DF scheme and related works [18,19,20,24] in terms of communication and computation overheads.
Communication costs encompass data transmission via private channels and broadcast channels, whereas computational costs primarily focus on the burden associated with private channels. System public parameters, ciphertexts, and re-encrypted ciphertexts are public information and do not require transmission to the user through private channels. Consequently, this paper emphasizes the communication burden imposed by re-encryption keys. The IB-BPRE-DF scheme exhibits a significant advantage in the setting of re-encryption keys compared to other schemes [18,19,20,24]. Specifically, this scheme only requires selecting one element from the domain as the re-encryption key, and its selection process is independent of the number of broadcast receivers. By contrast, the number of re-encryption keys in other schemes is typically directly proportional to the number of receivers.
Computational costs primarily stem from key extraction, encryption, re-encryption key generation, re-encryption operations, and the decryption of both original and re-encrypted ciphertexts. Key extraction and re-encryption algorithms are handled by the key generation center and proxy server, respectively, both assumed to have ample computational resources. This study focuses on the computational costs borne by terminal users with constrained computing capabilities. As shown in Table 3, in the IB-BPRE-DF scheme, the delegator incurs no computational overhead for setting up the re-encryption key, whereas schemes [18,19,20,24] require at least O ( | S | ) exponentiations, which imposes a significant burden on users with constrained computing power. During the decryption of the original ciphertext, the computational overhead of IB-BPRTE-DF is comparable to that in [19,24], but users in [18,20] bear higher computational costs. In the stage of decrypting the re-encrypted ciphertext, the computational overhead of this scheme is similar to that in [18,20,24]. However, although the scheme [19] requires users to bear only a small amount of computational overhead, it struggles to flexibly and efficiently adapt to frequent data-sharing scenarios in cloud environments.

6.2. Experimental Results

We utilized the Java Pairing-Based Cryptography (JPBC) Library [30] to implement the IB-BPRE-DF scheme and related works on personal computers. Specifically, the smartphone was employed to represent users with resource-constrained mobile devices.
Experiment settings. In the experiment, the smartphone operated on the Android 11 platform with specifications of 8 GB RAM and an 8-core 64-bit CPU processor running at 3072 MHz. The type A elliptic curve in the PBC library [30], with a 160-bit group order, was selected for conducting experiments. The elliptic curve had the form E : y 2 = x 3 + x and was defined over the finite field F q . Two groups, G and G T , were introduced, both of which had an order p and were subgroups of E F q . Specifically, p = 160 bits and q = 512 bits in the binary system. Additionally, we let | G | = | G T | = 1024 bits and | F q | = 160 bits.
Experiment results. Figure 2 and Table 3 illustrate the implementation of the algorithms presented in [24] (referred to as BPRE-1), in [20] (referred to as BPRE-2), and the proposed IB-BPRE-DF scheme. To provide a clearer visualization, Figure 3 employs a non-uniform axis. As illustrated in Figure 4 (with | S | = 50 ), the encryption time of the proposed IB-BPRE-DF scheme is approximately 93.433 ms, which is lower than that of [24] (123.36 ms) and comparable to [20] (93.523 ms). Figure 3 shows that the re-encryption key generation in IB-BPRE-DF incurs only 1.347 ms (with | S | = 50 ), in stark contrast to the 1558.7 ms and 1559.724 ms required by [24] and [20], respectively. This significant reduction greatly alleviates the computational burden on resource-constrained mobile devices. According to Table 4 and Figure 5 (for | S | = 50 ), the decryption times for original ciphertexts in [20,24] and IB-BPRE-DF are 403.234 ms, 436.86 ms, and 401.352 ms, respectively. For re-encrypted ciphertexts, the decryption time of IB-BPRE-DF is comparable to [20]. Although [24] requires slightly less computation during decryption, it lacks dynamic support for user revocation and addition. The experimental results shown in Figure 4, Figure 5 and Figure 6 and Table 4 demonstrate that the IB-BPRE-DF scheme provides a notable efficiency advantage for algorithms executed on resource-constrained mobile devices.
Table 4. Execution time.
Table 4. Execution time.
AlgorithmsEncRe-KeyDec( ct )Dec( ct )
| S | = 10 92.243 ms 1.221 ms 401.686 ms 499.946 ms
| S | = 20 93.124 ms 1.340 ms 402.347 ms 812.680 ms
| S | = 30 92.574 ms 1.274 ms 403.580 ms 1125.426 ms
| S | = 40 92.822 ms 1.210 ms 402.554 ms 1438.166 ms
| S | = 50 92.433 ms 1.347 ms 401.352 ms 1750.906 ms

7. Conclusions

We presented an identity-based broadcast proxy re-encryption scheme with dynamic functionality (IB-BPRE-DF) designed to facilitate secure and efficient data sharing in cloud environments. The proposed scheme supported dynamic user revocation and addition without requiring updates to the re-encryption key, thereby maintaining a constant key size. This design eliminated the need for repeated reconfiguration and distribution of re-encryption keys by the data owner in response to changes in user membership, which significantly improved system flexibility and reduced communication overhead. Furthermore, performance evaluations demonstrated that IB-BPRE-DF achieved communication and computational efficiency compared to existing BPRE schemes, particularly in reducing the computational burden on resource-constrained users.
Although the proposed identity-based broadcast proxy re-encryption scheme with dynamic functionality (IB-BPRE-DF) effectively reduced computational and communication overhead in dynamic environments, several limitations remained to be addressed. First, the current design did not consider resistance to quantum attacks. Second, while the computational cost of encrypting and decrypting the original ciphertext had been reduced, the decryption of re-encrypted ciphertext still imposed a considerable burden on resource-constrained users.
Future work will focus on integrating quantum-resistant cryptographic techniques, including lattice-based cryptography and hash-based cryptography, into the broadcast proxy re-encryption framework, thereby enhancing its resilience against quantum adversaries. In particular, we aim to design a lattice-based BPRE scheme that preserves dynamic functionality while ensuring security under post-quantum assumptions. To improve computational efficiency, we will investigate lightweight lattice constructions and optimize key and ciphertext sizes using structured lattices such as Ring-LWE. Moreover, we will investigate secure outsourcing mechanisms that delegate the decryption of re-encrypted ciphertext to third-party servers with substantial computational capabilities while preserving both the correctness of the decryption process and the confidentiality of the underlying data.

Author Contributions

Writing—original draft preparation, H.H.; writing—review and editing, H.H. and H.J.; formal analysis, H.H., C.L. and H.J.; resources, H.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported in part by the National Natural Science Foundation of China (Grant No. U1705264) and the Fuzhou Science and Technology Planning Projects (Project Nos. 2024-Y-013, 2024-SG-005, 2024H6008, 2023-ZD-003, and 2022-ZD-022).

Data Availability Statement

The data is contained within the article.

Conflicts of Interest

Author Huasong Jin was employed by the company Fujian Zhong Xin Network Security Information Technology Co., Ltd. The remaining authors declare that the research was conducted in the absence ofany commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Blaze, M.; Bleumer, G.; Strauss, M. Divertible protocols and atomic proxy cryptography. In Advances in Cryptology-EUROCRYPT-98; Springer: Berlin/Heidelberg, Germany, 1998; pp. 127–144. [Google Scholar]
  2. Luo, F.; Wang, H.; Susilo, W.; Yan, X.; Zheng, X. Public trace-and-revoke proxy re-encryption for secure data sharing in clouds. IEEE Trans. Inf. Forensics Secur. 2024, 19, 2919–2934. [Google Scholar] [CrossRef]
  3. Zhang, Q.; Fu, Y.; Cui, J.; He, D.; Zhong, H. Efficient fine-grained data sharing based on proxy re-encryption in IIoT. IEEE Trans. Dependable Secur. Comput. 2024, 21, 5797–5809. [Google Scholar] [CrossRef]
  4. Liu, G.; Xie, H.; Wang, W.; Huang, H. A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption. J. Cloud Comput. 2024, 13, 44. [Google Scholar] [CrossRef]
  5. Rawal, B.S.; Manogaran, G.; Hamdi, M. Multi-tier stack of block chain with proxy re-encryption method scheme on the internet of things platform. ACM Trans. Internet Technol. (TOIT) 2021, 22, 1–20. [Google Scholar] [CrossRef]
  6. Lin, S.; Cui, L.; Ke, N. End-to-end encrypted message distribution system for the Internet of Things based on conditional proxy re-encryption. Sensors 2024, 24, 438. [Google Scholar] [CrossRef] [PubMed]
  7. Green, M.; Ateniese, G. Identity-based proxy re-encryption. In Applied Cryptography and Network Security: Proceedings of the 5th International Conference, ACNS 2007, Zhuhai, China, 5–8 June 2007; Proceedings 5; Springer: Berlin/Heidelberg, Germany, 2007; pp. 288–306. [Google Scholar]
  8. Boneh, D.; Franklin, M. Identity-based encryption from the Weil pairing. In Proceedings of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 19–23 August 2001; Springer: Berlin/Heidelberg, Germany, 2001; pp. 213–229. [Google Scholar]
  9. Xu, P.; Jiao, T.; Wu, Q.; Wang, W.; Jin, H. Conditional identity-based broadcast proxy re-encryption and its application to cloud email. IEEE Trans. Comput. 2015, 65, 66–79. [Google Scholar] [CrossRef]
  10. Cao, Z.; Wang, H.; Zhao, Y. AP-PRE: Autonomous path proxy re-encryption and its applications. IEEE Trans. Dependable Secur. Comput. 2017, 16, 833–842. [Google Scholar] [CrossRef]
  11. Zhou, Y.; Liu, S.; Han, S.; Zhang, H. Fine-grained proxy re-encryption: Definitions and constructions from LWE. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, 4–8 December 2023; Springer Nature: Singapore, 2023; pp. 199–231. [Google Scholar]
  12. Zhou, Y.; Liu, S.; Han, S. Multi-hop fine-grained proxy re-encryption. In Proceedings of the IACR International Conference on Public-Key Cryptography, Sydney, Australia, 15–17 April 2024; Springer: Cham, Switzerland, 2024; pp. 161–192. [Google Scholar]
  13. Pei, H.; Yang, P.; Li, W.; Du, M.; Hu, Z. Proxy re-encryption for secure data sharing with blockchain in internet of medical things. Comput. Netw. 2024, 245, 110373. [Google Scholar] [CrossRef]
  14. Fiat, A.; Naor, M. Broadcast encryption. In Advances in Cryptology-CRYPTO’93; Springer: Berlin/Heidelberg, Germany, 1994; pp. 480–491. [Google Scholar]
  15. Boneh, D.; Gentry, C.; Waters, B. Collusion resistant broadcast encryption with short ciphertexts and private keys. In Advances in Cryptology-CRYPTO 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 258–275. [Google Scholar]
  16. Boneh, D.; Gentry, C.; Waters, B. Identity-based broadcast encryption with constant size ciphertexts and private keys. In Advances in Cryptology-ASIACRYPT 2007; Springer: Berlin/Heidelberg, Germany, 2007; pp. 200–215. [Google Scholar]
  17. Chu, C.K.; Weng, J.; Chow, S.S.M.; Zhou, J.; Deng, R.H. Conditional proxy broadcast re-encryption. In Proceedings of the 14th Australasian Conference on Information Security and Privacy, Brisbane, Australia, 1–3 July 2009; Springer: Berlin/Heidelberg, Germany, 2009; pp. 327–342. [Google Scholar]
  18. Sun, M.; Ge, C.; Fang, L.; Wang, J. A proxy broadcast re-encryption for cloud data sharing. Multimed. Tools Appl. 2018, 77, 10455–10469. [Google Scholar] [CrossRef]
  19. Maiti, S.; Misra, S. P2B: Privacy preserving identity-based broadcast proxy re-encryption. IEEE Trans. Veh. Technol. 2020, 69, 5610–5617. [Google Scholar] [CrossRef]
  20. Zhang, J.; Su, S.; Zhong, H.; Cui, J.; He, D. Identity-based broadcast proxy re-encryption for flexible data sharing in VANETs. IEEE Trans. Inf. Forensics Secur. 2023, 18, 4830–4842. [Google Scholar] [CrossRef]
  21. Liu, X.; Song, H.; Li, Z.; Yin, Y.; Han, G.; Liu, S. Identity-Based Threshold Broadcast Proxy Re-encryption Plus Scheme. In Proceedings of the International Conference on Frontiers in Cyber Security, Chongquing, China, 26–28 July 2024; Springer Nature: Singapore, 2024; pp. 396–412. [Google Scholar]
  22. Li, B.; Deng, L.; Mou, Y. A Pairing-Free Identity-Based Broadcast Proxy Re-Encryption Scheme for the Cloud. In Proceedings of the 2024 14th International Conference on Information Technology in Medicine and Education (ITME), Guiyang, China, 13–15 September 2024; pp. 521–528. [Google Scholar]
  23. Li, B.; Deng, L.; Liu, H.; Mou, Y.; Qu, Y.; Wang, N. A CCA-Secure Pairing-Free Broadcast Proxy Re-Encryption Scheme for VANETs. IEEE Trans. Veh. Technol. 2025; early access. [Google Scholar]
  24. Ge, C.; Liu, Z.; Xia, J.; Fang, L. Revocable identity-based broadcast proxy re-encryption for data sharing in clouds. IEEE Trans. Dependable Secur. Comput. 2019, 18, 1214–1226. [Google Scholar] [CrossRef]
  25. Maiti, S.; Misra, S.; Mondal, A. CBP: Coalitional-Game-Based Broadcast Proxy Re-Encryption in IoT. IEEE Internet Things J. 2023, 10, 15642–15651. [Google Scholar] [CrossRef]
  26. Maiti, S.; Misra, S.; Mondal, A. MBP: Multi-channel broadcast proxy re-encryption for cloud-based IoT devices. Comput. Commun. 2024, 214, 57–66. [Google Scholar] [CrossRef]
  27. Chen, L.; Zhang, M.; Li, J. Conditional Identity-Based Broadcast Proxy Re-Encryption With Anonymity and Revocation. IEEE Trans. Reliab. 2025; early access. [Google Scholar]
  28. Galbraith, S.D.; Paterson, K.G.; Smart, N.P. Pairings for cryptographers. Discret. Appl. Math. 2008, 156, 3113–3121. [Google Scholar] [CrossRef]
  29. Boneh, D.; Boyen, X.; Goh, E.J. Hierarchical identity based encryption with constant size ciphertext. In Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, 22–26 May 2005; Springer: Berlin/Heidelberg, Germany, 2005; pp. 440–456. [Google Scholar]
  30. Lynn, B. On the Implementation of Pairing-Based Cryptosystems. Available online: http://crypto.stanford.edu/pbc (accessed on 7 May 2014).
Figure 1. IB-BPRE-DF applied to data sharing in the cloud.
Figure 1. IB-BPRE-DF applied to data sharing in the cloud.
Symmetry 17 01008 g001
Figure 2. High level interactions in the concrete construction.
Figure 2. High level interactions in the concrete construction.
Symmetry 17 01008 g002
Figure 3. Re-key generation time.
Figure 3. Re-key generation time.
Symmetry 17 01008 g003
Figure 4. Encryption time.
Figure 4. Encryption time.
Symmetry 17 01008 g004
Figure 5. Decryption ( c t ) time.
Figure 5. Decryption ( c t ) time.
Symmetry 17 01008 g005
Figure 6. Decryption ( c t ) time.
Figure 6. Decryption ( c t ) time.
Symmetry 17 01008 g006
Table 1. Function comparison.
Table 1. Function comparison.
SchemesBroadcastDynamicsRevocationConstant Size—(rk)
[18]××
[24]××
[19]×××
[20]×××
IB-BPRE-DF
Table 2. Computation overhead comparison.
Table 2. Computation overhead comparison.
Schemes | pp | | ct | | rk | | ct |
[18] 2 n | G | + 4 | H | 4 | G | + 2 | H | 6 | G | + 1 | H | 7 | G | + 2 | H |
[24] ( 2 n + 5 ) | G | + 2 | H | + 1 | Z p | 2 | G | ( k + 6 ) | G | 3 | G |
[19] 8 | G | + 2 | H | 3 | G | 2 | G | + O ( | S | ) | Z p | 2 | G | + O ( | S | ) | Z p |
[20] 8 | G | + 2 | H | 4 | G | + 1 | Z p | 2 | G | + O ( | S | ) | Z p | 3 | G | + O ( | S | ) | Z p |
IB-BPRE-DF ( n + 6 ) | G | + 1 | H | + 1 | Z p | 4 | G | + 1 | Z p | 1 | Z p | 3 | G |
Table 3. Storage overhead comparison.
Table 3. Storage overhead comparison.
SchemesExtractEncRe-KeyRe-EnDec( ct )Dec( ct )
[18] 1 t e O ( | S | ) t e + t p O ( | S | ) t e + 1 t p O ( | S | ) t e + 8 t p | O ( | S | ) t e + 8 t p O ( | S | ) t e + 7 t p
[24] 1 t e 4 t e O ( | S | ) t e 1 t e + 2 t p 1 t e + 2 t p O ( | S | ) t e + 3 t p
[19] 1 t e 3 t e O ( | S | ) t e 1 t p 1 t p 1 t e + 2 t p
[20] 2 t e 3 t e + O ( | S | ) t h O ( | S | ) t e O ( | S | ) t e + 2 t p 2 t e + 2 t p + O ( | S | ) t h 2 t e + 2 t p + O ( | S | ) t h
IB-BPRE-DF 1 t e 3 t e 0 O ( | S | ) t e 1 t e + 2 t p O ( | S | ) t e + 3 t p
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Hu, H.; Jin, H.; Lin, C. Identity-Based Broadcast Proxy Re-Encryption with Dynamic Functionality for Flexible Data Sharing in Cloud Environments. Symmetry 2025, 17, 1008. https://doi.org/10.3390/sym17071008

AMA Style

Hu H, Jin H, Lin C. Identity-Based Broadcast Proxy Re-Encryption with Dynamic Functionality for Flexible Data Sharing in Cloud Environments. Symmetry. 2025; 17(7):1008. https://doi.org/10.3390/sym17071008

Chicago/Turabian Style

Hu, Huidan, Huasong Jin, and Changlu Lin. 2025. "Identity-Based Broadcast Proxy Re-Encryption with Dynamic Functionality for Flexible Data Sharing in Cloud Environments" Symmetry 17, no. 7: 1008. https://doi.org/10.3390/sym17071008

APA Style

Hu, H., Jin, H., & Lin, C. (2025). Identity-Based Broadcast Proxy Re-Encryption with Dynamic Functionality for Flexible Data Sharing in Cloud Environments. Symmetry, 17(7), 1008. https://doi.org/10.3390/sym17071008

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop