Flexible attribute-based proxy re-encryption for efficient data sharing

被引:74
作者
Deng, Hua [1 ]
Qin, Zheng [1 ]
Wu, Qianhong [2 ]
Guan, Zhenyu [2 ]
Zhou, Yunya [3 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Beihang Univ, Sch Cyber Sci & Technol, Beijing 100083, Peoples R China
[3] State Grid Hunan Maintenance Co, Changsha 410004, Hunan, Peoples R China
基金
中国国家自然科学基金;
关键词
Data security; Cryptographic access control; Access policy flexibility; Proxy re-encryption; Attribute-based encryption; SECURE;
D O I
10.1016/j.ins.2019.09.052
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
An increasing number of people are sharing their data through third-party platforms. Attribute-based encryption (ABE) is a promising primitive that allows enforcing fine-grained access control on the data to be shared. An issue in ABE is that a priori access policies should be determined during the system setup or encryption phase, but these policies will become obsolete over time. Another issue is that the decryption of ABE generally requires complicated and expensive computations, which may be unaffordable for resource-limited users (e.g., mobile-device users). To address these issues, we propose a new paradigm called hybrid attribute-based proxy re-encryption (HAPRE). In HAPRE, a semitrusted proxy can be authorized to convert ciphertexts of an ABE scheme into ciphertexts of an identity-based encryption (IBE) scheme without letting the proxy know the underlying messages. With these features, HAPRE enables resource-limited users to efficiently access the data previously encrypted by ABE. We construct two HAPRE schemes by utilizing a compact IBE scheme and a key rerandomization technique, and then we prove that the schemes are semantically secure and collusion resistant. Theoretical and experimental analyses demonstrate the efficiency of the HAPRE schemes. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:94 / 113
页数:20
相关论文
共 50 条
[1]  
[Anonymous], 2001, ANN INT CRYPTOLOGY C
[2]  
[Anonymous], 1996, SECURE SCHEMES SECRE
[3]  
[Anonymous], 2017, IEEE T DEPENDABLE SE, DOI DOI 10.1109/TDSC.2017.2714166
[4]  
[Anonymous], 2011, P USENIX SEC S
[5]  
[Anonymous], IEEE T SERV COMPUT
[6]  
[Anonymous], 2001, Proceedings. Lecture Notes in Computer Science, DOI [DOI 10.1007/3-540-45682-1_30, DOI 10.1007/3-540-45682-130]
[7]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[8]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[9]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[10]   Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security [J].
Brakerski, Zvika ;
Vaikuntanathan, Vinod .
ADVANCES IN CRYPTOLOGY (CRYPTO 2016), PT III, 2016, 9816 :363-384