Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption

被引:0
|
作者
Mizuno, Takeo [1 ,2 ]
Doi, Hiroshi [2 ]
机构
[1] NTT Data Corp, Koutou Ku, 3-3-3 Toyosu, Tokyo 1356033, Japan
[2] Inst Informat Secur, Yokohama, Kanagawa 2210835, Japan
来源
INFORMATION SECURITY AND CRYPTOLOGY | 2010年 / 6151卷
关键词
attribute-based encryption; proxy re-encryption; identity-based encryption; bilinear maps; IDENTITY-BASED ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In ciphertext policy attribute based encryption (ABE) schemes the sender selects an access structure and generates a ciphertext, which decryptors can get plaintext if he has certain set of secret key associate with his attributes which satisfies the access structure. On the other hand, many organisations already introduced standard identity based encryption (TEE) or public key encryption (PKE) where only a single recipient is specified at the time of encryption. To utilize the above schemes and to simplify the management of user's key, it is valuable to develop a proxy re-encryption schemes between ABE schemes and IBE schemes. In this paper we propose the first proxy re-encryption scheme, which can convert an ABE ciphertext to a ciphertext which is encrypted by IBE scheme. Using new proxy re-encryption scheme, some useful applications can he constructed. Furthermore, we prove the security in the standard model based on decisional bilinear Diffie-Hellman assumption.
引用
收藏
页码:288 / +
页数:3
相关论文
共 50 条
  • [41] An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme
    Wang, Changji
    Fang, Jian
    Li, Yuan
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 14 - 26
  • [42] A type-and-identity-based proxy re-encryption scheme and its application in healthcare
    Ibraimi, Luan
    Tang, Qiang
    Hartel, Pieter
    Jonker, Willem
    SECURE DATA MANAGEMENT, PROCEEDINGS, 2008, 5159 : 185 - 198
  • [43] Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT
    Hanshu Hong
    Zhixin Sun
    World Wide Web, 2018, 21 : 595 - 607
  • [44] Sharing your privileges securely: a key-insulated attribute based proxy re-encryption scheme for IoT
    Hong, Hanshu
    Sun, Zhixin
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (03): : 595 - 607
  • [45] Performance Analysis of the Symmetric Proxy Re-encryption Scheme
    Meiliasari, Rizky Putri
    Syalim, Amril
    Yazid, Setiadi
    2019 4TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2019), 2019, : 91 - 96
  • [46] Hierarchical Identity Role based proxy re-encryption scheme for cloud computing
    Nirmala, V
    Shanmugalakshmi, R.
    PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2013,
  • [47] Circular Transitivity of a Bidirectional Proxy Re-encryption Scheme
    Hong, Xiaojing
    Wang, Bin
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2639 - +
  • [48] A Timed-Release Proxy Re-Encryption Scheme
    Emura, Keita
    Miyaji, Atsuko
    Omote, Kazumasa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (08) : 1682 - 1695
  • [49] Efficient proxy re-encryption with keyword search scheme
    Guo, Lifeng
    Lu, Bo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (06): : 1221 - 1228
  • [50] Proxy Re-Encryption Scheme for Decentralized Storage Networks
    Kan, Jia
    Zhang, Jie
    Liu, Dawei
    Huang, Xin
    APPLIED SCIENCES-BASEL, 2022, 12 (09):