Weighted Attribute Based Conditional Proxy Re-Encryption in the Cloud

被引:0
|
作者
Yan, Xixi [1 ]
Zhang, Jing [2 ]
Cheng, Pengyu [2 ]
机构
[1] Henan Polytech Univ, Sch Software, Henan Key Lab Network Cryptog Technol, Network Informat Secur & Cryptog Lab, Jiaozuo 454003, Peoples R China
[2] Henan Polytech Univ, Sch Comp Sci & Technol, Jiaozuo 454000, Peoples R China
来源
CMC-COMPUTERS MATERIALS & CONTINUA | 2025年 / 83卷 / 01期
关键词
Cloud service; conditional proxy re-encryption; user revocation; weighted attribute; CIPHERTEXT EVOLUTION; SCHEME;
D O I
10.32604/cmc.2025.059969
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Conditional proxy re-encryption (CPRE) is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular, but most of the attribute-based conditional proxy re-encryption (AB-CPRE) schemes proposed so far do not take into account the importance of user attributes. A weighted attribute-based conditional proxy re-encryption (WAB-CPRE) scheme is thus designed to provide more precise decryption rights delegation. By introducing the concept of weight attributes, the quantity of system attributes managed by the server is reduced greatly. At the same time, a weighted tree structure is constructed to simplify the expression of access structure effectively. With conditional proxy re-encryption, large amounts of data and complex computations are outsourced to cloud servers, so the data owner (DO) can revoke the user's decryption rights directly with minimal costs. The scheme proposed achieves security against chosen plaintext attacks (CPA). Experimental simulation results demonstrated that the decryption time is within 6-9 ms, and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes, which enables users to access cloud data on devices with limited resources.
引用
收藏
页码:1399 / 1414
页数:16
相关论文
共 50 条
  • [1] Anonymous Attribute-Based Conditional Proxy Re-encryption
    Mao, Xianping
    Li, Xuefeng
    Wu, Xiaochuan
    Wang, Chuansheng
    Lai, Junzuo
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 95 - 110
  • [2] Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme
    Tang, Yongli
    Jin, Minglu
    Meng, Hui
    Yang, Li
    Zheng, Chengfu
    ENTROPY, 2023, 25 (05)
  • [3] Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud
    Chen, Yanli
    Hu, Yuanyuan
    Zhu, Minhui
    Yang, Geng
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2018, E101B (08) : 1798 - 1808
  • [4] Hierarchical Attribute Based Proxy Re-Encryption Access Control in Cloud Computing
    Chandar, P. Praveen
    Muthuraman, D.
    Rathinraj, M.
    2014 IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT-2014), 2014, : 1565 - 1570
  • [5] Fuzzy conditional proxy re-encryption
    Fang LiMing
    Wang JianDong
    Ge ChunPeng
    Ren YongJun
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) : 1 - 13
  • [6] Revocable attribute-based proxy re-encryption
    Luo, Fucai
    Al-Kuwari, Saif
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) : 465 - 482
  • [7] On the Security of a Conditional Proxy Re-Encryption
    Zhang, Xi
    Chen, Min-Rong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10) : 2644 - 2647
  • [8] Attribute-Based Conditional Proxy Re-encryption in the Standard Model Under LWE
    Liang, Xiaojian
    Weng, Jian
    Yang, Anjia
    Yao, Lisha
    Jiang, Zike
    Wu, Zhenghao
    COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 147 - 168
  • [9] Hierarchical conditional proxy re-encryption
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 380 - 389
  • [10] Attribute-Based Conditional Proxy Re-Encryption with Chosen-Ciphertext Security
    Zhao, Jing
    Feng, Dengguo
    Zhang, Zhenfeng
    2010 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE GLOBECOM 2010, 2010,