Hierarchical conditional proxy re-encryption

被引:12
|
作者
Fang, Liming [2 ]
Susilo, Willy [1 ]
Ge, Chunpeng [2 ]
Wang, Jiandong [2 ]
机构
[1] Univ Wollongong, Ctr Comp & Informat Secur Research, Sch Comp Sci & Software Engn, Wollongong, NSW 2522, Australia
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210016, Peoples R China
关键词
Proxy re-encryption; Hierarchical conditional proxy re-encryption; Chosen-ciphertext security; PUBLIC-KEY ENCRYPTION; IDENTITY-BASED ENCRYPTION; KEYWORD SEARCH;
D O I
10.1016/j.csi.2012.01.002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce a new primitive called hierarchical conditional proxy re-encryption (HC-PRE) that enhances the concept of C-PRE by allowing more general re-encryption key delegation patterns. Hierarchical conditional proxy re-encryption (HC-PRE) scheme is the hierarchical extension of conditional proxy re-encryption (C-PRE) where the condition is a vector of keywords. We present an efficient construction of hierarchical key derivation C-PRE scheme where the ciphertext length is independent from the depth of the hierarchy. We further extend our work by presenting a more generalized key delegation, by allowing the use of a wildcard in the keyword vector. (C) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:380 / 389
页数:10
相关论文
共 50 条
  • [1] Fuzzy conditional proxy re-encryption
    Fang LiMing
    Wang JianDong
    Ge ChunPeng
    Ren YongJun
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) : 1 - 13
  • [2] Fuzzy conditional proxy re-encryption
    FANG LiMing
    WANG JianDong
    GE ChunPeng
    REN YongJun
    ScienceChina(InformationSciences), 2013, 56 (05) : 211 - 223
  • [3] Fuzzy conditional proxy re-encryption
    LiMing Fang
    JianDong Wang
    ChunPeng Ge
    YongJun Ren
    Science China Information Sciences, 2013, 56 : 1 - 13
  • [4] A Searchable Hierarchical Conditional Proxy Re-Encryption Scheme for Cloud Storage Services
    Lee, Cheng-Chi
    Li, Chun-Ta
    Chen, Chin-Ling
    Chiu, Shih-Ting
    INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (03): : 289 - 299
  • [5] Proxy Impersonation Safe Conditional Proxy Re-Encryption
    Gandhi, Dheeraj
    Rangan, Pandu
    Selvi, Sharmila Deva
    Vivek, Sree
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 33 - 44
  • [6] Conditional Proxy Broadcast Re-Encryption
    Chu, Cheng-Kang
    Weng, Jian
    Chow, Sherman S. M.
    Zhou, Jianying
    Deng, Robert H.
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 327 - +
  • [7] Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing
    He, Kai
    Liu, Xueqiao
    Yuan, Huaqiang
    Wei, Wenhong
    Liang, Kaitai
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 118 - 135
  • [8] Anonymous Conditional Proxy Re-encryption without Random Oracle
    Fang, Liming
    Susilo, Willy
    Wang, Jiandong
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 47 - +
  • [9] An Authenticated Keyword Searchable Conditional Proxy Re-encryption Scheme in Cloud Services
    Sharma, Sumit
    Swarnakar, Ashutosh
    Babu, Ch Jayanth
    Padmavathy, R.
    Kumar, Rakesh
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [10] Certificate-Based Conditional Proxy Re-Encryption
    Li, Jiguo
    Zhao, Xuexia
    Zhang, Yichen
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 299 - 310