A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system

被引:50
作者
Ge, Chunpeng [1 ,2 ]
Susilo, Willy [3 ]
Fang, Liming [4 ]
Wang, Jiandong [4 ]
Shi, Yunqing [5 ]
机构
[1] Jiangsu Univ Technol, Dept Comp Engn, Changzhou, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing, Peoples R China
[3] Univ Wollongong, Sch Comp & Informat Technol, Inst Cybersecur & Cryptol, Wollongong, NSW, Australia
[4] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
[5] New Jersey Inst Technol, Dept Elect & Comp Engn, Newark, NJ 07102 USA
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Proxy re-encryption; Attribute-based proxy re-encryption; Key-policy; Adaptive model;
D O I
10.1007/s10623-018-0462-9
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The notion of attribute-based proxy re-encryption extends the traditional proxy re-encryption to the attribute-based setting. In an attribute-based proxy re-encryption scheme, the proxy can convert a ciphertext under one access policy to another ciphertext under a new access policy without revealing the underlying plaintext. Attribute-based proxy re-encryption has been widely used in many applications, such as personal health record and cloud data sharing systems. In this work, we propose the notion of key-policy attribute-based proxy re-encryption, which supports any monotonic access structures on users' keys. Furthermore, our scheme is proved against chosen-ciphertext attack secure in the adaptive model.
引用
收藏
页码:2587 / 2603
页数:17
相关论文
共 19 条
  • [1] [Anonymous], 1996, SECURE SCHEMES SECRE
  • [2] Ateniese G., 2005, NDSS, P29
  • [3] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
  • [4] Boneh D, 2005, LECT NOTES COMPUT SC, V3378, P325
  • [5] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
  • [6] Canetti R., 1999, P PKC 1999 KAM JAP M, P53
  • [7] Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185
  • [8] Cramer R., 2004, J COMPUT, V33, P167
  • [9] Interactive conditional proxy re-encryption with fine grain policy
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    [J]. JOURNAL OF SYSTEMS AND SOFTWARE, 2011, 84 (12) : 2293 - 2302
  • [10] Goyal V., 2006, P 2006 INT C PRIVACY, P1