Time-based attribute-based proxy re-encryption with decryption key update

被引:0
|
作者
Zhao, Feixiang [1 ]
Weng, Jian [1 ,2 ,3 ]
Xie, Wenli [1 ]
Hou, Lin [1 ]
Li, Ming [1 ]
机构
[1] Jinan Univ, Guangzhou 510632, Peoples R China
[2] Natl Joint Engn Res Ctr Network Secur Detect & Pro, Guangzhou 510632, Peoples R China
[3] Guangdong Key Lab Data Secur & Privacy Preserving, Guangzhou 510632, Peoples R China
基金
中国国家自然科学基金;
关键词
Attribute-based proxy re-encryption; Key update; Time-based delegation; Honest re-encryption attacks; Decryption key exposure resistance; Learning with errors; STANDARD;
D O I
10.1007/s10623-024-01467-x
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Proxy re-encryption (PRE) is a cryptosystem that realizes efficient encrypted data sharing by allowing a third party proxy to transform a ciphertext intended for a delegator (i.e., Alice) to a ciphertext intended for a delegatee (i.e., Bob). Attribute-based proxy re-encrypftion (AB-PRE) generalizes PRE to the attribute-based scenarios, enabling fine-grained access control on ciphertexts. However, the existing AB-PRE schemes do not adequately address the following problems: (1) the risk of decryption key leakage, and (2) the need of time-based delegation. To resolve these problems, we introduce a primitive called time-based attribute-based proxy re-encryption (TB-AB-PRE) with decryption key update. TB-AB-PRE associates keys with the current time information and supports efficient periodical decryption key update for each time transition. This property guarantees that a compromise of a decryption key for some time does not breach the security of ciphertexts from the others. Leveraging this time-based property, the proposed TB-AB-PRE elegantly achieves time-based delegation which enables Alice to decide which ciphertexts can be transformed and their decryptable timeframe after being transformed. The proposed construction is proven to be secure against honest re-encryption attacks with decryption key exposure resistance, under the learning with errors assumption.
引用
收藏
页码:4099 / 4129
页数:31
相关论文
共 50 条
  • [41] Weighted Attribute-Based Proxy Re-Encryption Scheme with Distributed Multi-Authority Attributes
    Yi, Wenlong
    Wang, Chuang
    Kuzmin, Sergey
    Gerasimov, Igor
    Cheng, Xiangping
    SENSORS, 2024, 24 (15)
  • [42] Verifiable and hybrid attribute-based proxy re-encryption for flexible data sharing in cloud storage
    Sun, Lixue
    Xu, Chunxiang
    Zeng, Fugeng
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2024, 193
  • [43] Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud
    Yan, Xixi
    Zhang, Jing
    Cheng, Pengyu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2025, 83 (01): : 1399 - 1414
  • [44] Attribute-based encryption with outsourced decryption in blockchain
    Hui Zheng
    Jun Shao
    Guiyi Wei
    Peer-to-Peer Networking and Applications, 2020, 13 : 1643 - 1655
  • [45] Attribute-Based Encryption With Verifiable Outsourced Decryption
    Lai, Junzuo
    Deng, Robert H.
    Guan, Chaowen
    Weng, Jian
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (08) : 1343 - 1354
  • [46] Time-based proxy re-encryption scheme for secure data sharing in a cloud environment
    Liu, Qin
    Wang, Guojun
    Wu, Jie
    INFORMATION SCIENCES, 2014, 258 : 355 - 370
  • [47] Chosen-ciphertext secure multi-use unidirectional attribute-based proxy re-encryption
    Li, Juanjuan
    Liu, Zhenhua
    Zu, Longhui
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 96 - 103
  • [48] A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds
    Liang, Kaitai
    Fang, Liming
    Wong, Duncan S.
    Susilo, Willy
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08): : 2004 - 2027
  • [49] Attribute-based encryption with outsourced decryption in blockchain
    Zheng, Hui
    Shao, Jun
    Wei, Guiyi
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (05) : 1643 - 1655
  • [50] Weighted Attribute-based Encryption with Parallelized Decryption
    Ionita, Alexandru
    SECRYPT : PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2022, : 574 - 579