Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption

被引:25
作者
Kawai, Yutaka [1 ]
机构
[1] Mitsubishi Elect, Kamakura, Kanagawa 2478501, Japan
来源
INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015 | 2015年 / 9065卷
关键词
SCHEME;
D O I
10.1007/978-3-319-17533-1_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce a new proxy re-encryption (PRE) in that the re-encryption key generation can be outsourced, in attribute-based encryption. We call this new notion flexible ciphertext-policy attribute-based proxy re-encryption (flexible CP-AB-PRE). In ordinary PRE scheme, re-encryption keys are generated by using user's decryption key and an access structure. So, whenever the access structure is changed, a PRE user has to generate new different re-encryption keys. In order to overcome this disadvantage of the ordinary PRE, the reencryption key generation of the proposed scheme is divided into the following two steps. First, a user generates universal re-encryption key urkS which indicates delegator's attributes set S. Second, an authority who has re-encryption secret key rsk generates ordinary re-encryption key rk(S) -> M' by using urkS, rsk, and an access structure M'. The user has only to generate single urk(S) for all re-encryption keys. By this "outsourcing", the task of re-encryption key generation for a user is reduced only to generate one urkS. Furthermore, supposing a Private Key Generator (PKG) generates urk simultaneously at the time of decryption key generation, the load of re-encryption key generation for users almost vanishes.
引用
收藏
页码:301 / 315
页数:15
相关论文
共 27 条
  • [1] [Anonymous], IACR CRYPTOLOGY EPRI
  • [2] Arita Seiko, 2012, Information and Communication Security. 14th International Conference (ICICS 2012). Proceedings, P471, DOI 10.1007/978-3-642-34129-8_46
  • [3] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
  • [4] Beimel A., 1996, Secure schemes for secret sharing and key distribution
  • [5] Ciphertext-policy attribute-based encryption
    Bethencourt, John
    Sahai, Amit
    Waters, Brent
    [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
  • [6] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
  • [7] Boneh D, 2007, LECT NOTES COMPUT SC, V4392, P535
  • [8] Boneh D, 2008, LECT NOTES COMPUT SC, V5350, P455, DOI 10.1007/978-3-540-89255-7_28
  • [9] Chosen-ciphertext security from identity-based encryption
    Canetti, R
    Halevi, S
    Katz, J
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222
  • [10] Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185