Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption

被引:0
|
作者
Mizuno, Takeo [1 ,2 ]
Doi, Hiroshi [2 ]
机构
[1] NTT Data Corp, Koutou Ku, 3-3-3 Toyosu, Tokyo 1356033, Japan
[2] Inst Informat Secur, Yokohama, Kanagawa 2210835, Japan
来源
关键词
attribute-based encryption; proxy re-encryption; identity-based encryption; bilinear maps; IDENTITY-BASED ENCRYPTION;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In ciphertext policy attribute based encryption (ABE) schemes the sender selects an access structure and generates a ciphertext, which decryptors can get plaintext if he has certain set of secret key associate with his attributes which satisfies the access structure. On the other hand, many organisations already introduced standard identity based encryption (TEE) or public key encryption (PKE) where only a single recipient is specified at the time of encryption. To utilize the above schemes and to simplify the management of user's key, it is valuable to develop a proxy re-encryption schemes between ABE schemes and IBE schemes. In this paper we propose the first proxy re-encryption scheme, which can convert an ABE ciphertext to a ciphertext which is encrypted by IBE scheme. Using new proxy re-encryption scheme, some useful applications can he constructed. Furthermore, we prove the security in the standard model based on decisional bilinear Diffie-Hellman assumption.
引用
收藏
页码:288 / +
页数:3
相关论文
共 50 条
  • [1] Attribute-based proxy re-encryption scheme with multiple features
    Feng C.
    Luo W.
    Qin Z.
    Yuan D.
    Zou L.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 177 - 189
  • [2] Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme
    Tang, Yongli
    Jin, Minglu
    Meng, Hui
    Yang, Li
    Zheng, Chengfu
    ENTROPY, 2023, 25 (05)
  • [3] Attribute-based Proxy Re-encryption Scheme with Keyword Search
    Liu Zhenhua
    Zhou Peilin
    Duan Shuhong
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (03) : 683 - 689
  • [4] Revocable attribute-based proxy re-encryption
    Luo, Fucai
    Al-Kuwari, Saif
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) : 465 - 482
  • [5] Attribute-Based Proxy Re-Encryption with Keyword Search
    Shi, Yanfeng
    Liu, Jiqiang
    Han, Zhen
    Zheng, Qingji
    Zhang, Rui
    Qiu, Shuo
    PLOS ONE, 2014, 9 (12):
  • [6] Attribute-Based Proxy Re-Encryption with Dynamic Membership
    Fan, Chun-I
    Wu, Chien-Nan
    Chen, Chun-Hung
    Tseng, Yi-Fan
    Feng, Cheng-Chun
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 26 - 32
  • [7] Anonymous Attribute-Based Conditional Proxy Re-encryption
    Mao, Xianping
    Li, Xuefeng
    Wu, Xiaochuan
    Wang, Chuansheng
    Lai, Junzuo
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 95 - 110
  • [8] Ciphertext Policy Attribute-Based Proxy Re-encryption
    Luo, Song
    Hu, Jianbin
    Chen, Zhong
    INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 401 - +
  • [9] Attribute-based Searchable Proxy Re-encryption Blockchain Data Sharing Scheme
    Xu, Guangxia
    Huang, Yuling
    Ma, Chuang
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 372 - 380
  • [10] Secure and Efficient Data Sharing with Attribute-based Proxy Re-encryption Scheme
    Sepehri, Masoomeh
    Trombetta, Alberto
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2017), 2017,