Attribute-Based Proxy Re-Encryption with Dynamic Membership

被引:5
作者
Fan, Chun-I [1 ]
Wu, Chien-Nan [1 ]
Chen, Chun-Hung [1 ]
Tseng, Yi-Fan [1 ]
Feng, Cheng-Chun [1 ]
机构
[1] Natl Sun Yat Sen Univ, Dept Comp Sci & Engn, Kaohsiung 80424, Taiwan
来源
2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS) | 2015年
关键词
attribute-based encryption; proxy re-encryption; information security; STATE;
D O I
10.1109/AsiaJCIS.2015.21
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Cloud computing has been developed rapidly in recent years, and offers novel concepts and innovations in computer use. The applications of cloud computing are that people can put their data on cloud and also can designate a proxy to help them to execute a number of tasks in certain situations. The proxy re-encryption which is a cryptographic primitive has been proposed to solve this problem. In the proxy re-encryption system, when a user (e.g., Alice) wants to send a ciphertext that is encrypted by her public key and stored in the cloud to another user (e.g., Bob), she can designate a proxy to transform the ciphertext into a different ciphertext that can be decrypted by Bob's private key. Recently, Fan et al. proposed an attribute-based encryption scheme with dynamic membership. However, we found that their scheme may be flawed. In this paper we will modify Fan et al.'s scheme to fix the flaw. Based on our modified scheme and the proxy re-encryption, we also propose an attribute-based proxy re-encryption under bilinear pairing. Furthermore, the proposed scheme has rich access policies and dynamic membership.
引用
收藏
页码:26 / 32
页数:7
相关论文
共 12 条
[1]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[2]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[3]  
Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185
[4]  
Chu CK, 2007, LECT NOTES COMPUT SC, V4779, P189
[5]   Arbitrary-State Attribute-Based Encryption with Dynamic Membership [J].
Fan, Chun-I ;
Huang, Vincent Shi-Ming ;
Ruan, He-Ming .
IEEE TRANSACTIONS ON COMPUTERS, 2014, 63 (08) :1951-1961
[6]  
Green M, 2007, LECT NOTES COMPUT SC, V4521, P288
[7]   The state of elliptic curve cryptography [J].
Koblitz, N ;
Menezes, A ;
Vanstone, S .
DESIGNS CODES AND CRYPTOGRAPHY, 2000, 19 (2-3) :173-193
[8]  
Li J., 2014, P 9 AS JOINT C INF S
[9]  
Liang K., 2014, FUTURE GENERATION CO
[10]  
Liang Xiaohui., 2009, ASIACCS 09, P276, DOI DOI 10.1145/1533057.1533094