Time-based attribute-based proxy re-encryption with decryption key update

被引:0
|
作者
Zhao, Feixiang [1 ]
Weng, Jian [1 ,2 ,3 ]
Xie, Wenli [1 ]
Hou, Lin [1 ]
Li, Ming [1 ]
机构
[1] Jinan Univ, Guangzhou 510632, Peoples R China
[2] Natl Joint Engn Res Ctr Network Secur Detect & Pro, Guangzhou 510632, Peoples R China
[3] Guangdong Key Lab Data Secur & Privacy Preserving, Guangzhou 510632, Peoples R China
基金
中国国家自然科学基金;
关键词
Attribute-based proxy re-encryption; Key update; Time-based delegation; Honest re-encryption attacks; Decryption key exposure resistance; Learning with errors; STANDARD;
D O I
10.1007/s10623-024-01467-x
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Proxy re-encryption (PRE) is a cryptosystem that realizes efficient encrypted data sharing by allowing a third party proxy to transform a ciphertext intended for a delegator (i.e., Alice) to a ciphertext intended for a delegatee (i.e., Bob). Attribute-based proxy re-encrypftion (AB-PRE) generalizes PRE to the attribute-based scenarios, enabling fine-grained access control on ciphertexts. However, the existing AB-PRE schemes do not adequately address the following problems: (1) the risk of decryption key leakage, and (2) the need of time-based delegation. To resolve these problems, we introduce a primitive called time-based attribute-based proxy re-encryption (TB-AB-PRE) with decryption key update. TB-AB-PRE associates keys with the current time information and supports efficient periodical decryption key update for each time transition. This property guarantees that a compromise of a decryption key for some time does not breach the security of ciphertexts from the others. Leveraging this time-based property, the proposed TB-AB-PRE elegantly achieves time-based delegation which enables Alice to decide which ciphertexts can be transformed and their decryptable timeframe after being transformed. The proposed construction is proven to be secure against honest re-encryption attacks with decryption key exposure resistance, under the learning with errors assumption.
引用
收藏
页码:4099 / 4129
页数:31
相关论文
共 50 条
  • [21] Secure and Efficient Data Sharing with Attribute-based Proxy Re-encryption Scheme
    Sepehri, Masoomeh
    Trombetta, Alberto
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,
  • [22] Anonymous attribute-based proxy re-encryption for access control in cloud computing
    Zhang, Yinghui
    Li, Jin
    Chen, Xiaofeng
    Li, Hui
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (14) : 2397 - 2411
  • [23] Attribute-based Searchable Proxy Re-encryption Blockchain Data Sharing Scheme
    Xu, Guangxia
    Huang, Yuling
    Ma, Chuang
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 372 - 380
  • [24] Attribute-Based Conditional Proxy Re-encryption in the Standard Model Under LWE
    Liang, Xiaojian
    Weng, Jian
    Yang, Anjia
    Yao, Lisha
    Jiang, Zike
    Wu, Zhenghao
    COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 147 - 168
  • [25] Attribute-Based Conditional Proxy Re-Encryption with Chosen-Ciphertext Security
    Zhao, Jing
    Feng, Dengguo
    Zhang, Zhenfeng
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,
  • [26] ABP: Attribute-Based Broadcast Proxy Re-Encryption With Coalitional Game Theory
    Maiti, Sumana
    Misra, Sudip
    Mondal, Ayan
    IEEE SYSTEMS JOURNAL, 2024, 18 (01): : 85 - 95
  • [27] Attribute-based Proxy Re-encryption Method for Revocation in Cloud Data Storage
    Yasumura, Yoshiko
    Imabayashi, Hiroki
    Yamana, Hayato
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 4858 - 4860
  • [28] Time-based key management in attribute-based encryption using piecewise key generation
    Wang G.
    International Journal of Information and Computer Security, 2021, 16 (1-2) : 103 - 119
  • [29] Attribute-Based Proxy Re-Encryption With Direct Revocation Mechanism for Data Sharing in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Liu, Zhe
    Baek, Joonsang
    Luo, Xiapu
    Fang, Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2024, 21 (02) : 949 - 960
  • [30] Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption
    Feng, Xinyu
    Li, Cong
    Li, Dan
    Fang, Yuejian
    Shen, Qingni
    INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 192 - 204