Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption

被引:0
|
作者
Mizuno, Takeo [1 ,2 ]
Doi, Hiroshi [2 ]
机构
[1] NTT Data Corp, Koutou Ku, 3-3-3 Toyosu, Tokyo 1356033, Japan
[2] Inst Informat Secur, Yokohama, Kanagawa 2210835, Japan
来源
INFORMATION SECURITY AND CRYPTOLOGY | 2010年 / 6151卷
关键词
attribute-based encryption; proxy re-encryption; identity-based encryption; bilinear maps; IDENTITY-BASED ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In ciphertext policy attribute based encryption (ABE) schemes the sender selects an access structure and generates a ciphertext, which decryptors can get plaintext if he has certain set of secret key associate with his attributes which satisfies the access structure. On the other hand, many organisations already introduced standard identity based encryption (TEE) or public key encryption (PKE) where only a single recipient is specified at the time of encryption. To utilize the above schemes and to simplify the management of user's key, it is valuable to develop a proxy re-encryption schemes between ABE schemes and IBE schemes. In this paper we propose the first proxy re-encryption scheme, which can convert an ABE ciphertext to a ciphertext which is encrypted by IBE scheme. Using new proxy re-encryption scheme, some useful applications can he constructed. Furthermore, we prove the security in the standard model based on decisional bilinear Diffie-Hellman assumption.
引用
收藏
页码:288 / +
页数:3
相关论文
共 50 条
  • [21] A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds
    Liang, Kaitai
    Fang, Liming
    Wong, Duncan S.
    Susilo, Willy
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08) : 2004 - 2027
  • [22] Improved Proxy Re-encryption Scheme with Equality Test
    Yang, Chih-Chen
    Tso, Raylin
    Liu, Zi-Yuan
    Hsu, Jen-Chieh
    Tseng, Yi-Fan
    2021 16TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2021), 2021, : 37 - 44
  • [23] Proxy Re-Encryption Scheme Supporting a Selection of Delegatees
    Devigne, Julien
    Guerrini, Eleonora
    Laguillaumie, Fabien
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 13 - 30
  • [24] Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Liu, Zhe
    Baek, Joonsang
    Luo, Xiapu
    Fang, Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 949 - 960
  • [25] Blockchain-Based Digital Rights Management Scheme via Multiauthority Ciphertext-Policy Attribute-Based Encryption and Proxy Re-Encryption
    Gao, Juntao
    Yu, Haiyong
    Zhu, Xiuqin
    Li, Xuelian
    IEEE SYSTEMS JOURNAL, 2021, 15 (04): : 5233 - 5244
  • [26] Chosen-ciphertext secure multi-use unidirectional attribute-based proxy re-encryption
    Li, Juanjuan
    Liu, Zhenhua
    Zu, Longhui
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 96 - 103
  • [27] Proxy re-encryption systems for identity-based encryption
    Matsuo, Toshihiko
    Pairing-Based Cryptography - Pairing 2007, 2007, 4575 : 247 - 267
  • [28] dAPRE:Efficient and Reliable Attribute-Based Proxy Re-Encryption Using DAG for Data Sharing in IoT
    Li, Xiaoxiao
    Xie, Yong
    Wang, Hui
    Su, Xing
    Li, Haifeng
    IEEE TRANSACTIONS ON CONSUMER ELECTRONICS, 2024, 70 (01) : 584 - 596
  • [29] Proxy Re-encryption Scheme from IBE to CBE
    Wang, Xu An
    Yang, Xiaoyuan
    Zhang, Minqing
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 99 - 102
  • [30] Hierarchical conditional proxy re-encryption
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 380 - 389