@article{4a6cc5ae87ac41dbbdda70a48b6b01b9,
title = "A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system",
abstract = "The notion of attribute-based proxy re-encryption extends the traditional proxy re-encryption to the attribute-based setting. In an attribute-based proxy re-encryption scheme, the proxy can convert a ciphertext under one access policy to another ciphertext under a new access policy without revealing the underlying plaintext. Attribute-based proxy re-encryption has been widely used in many applications, such as personal health record and cloud data sharing systems. In this work, we propose the notion of key-policy attribute-based proxy re-encryption, which supports any monotonic access structures on users{\textquoteright} keys. Furthermore, our scheme is proved against chosen-ciphertext attack secure in the adaptive model.",
keywords = "Adaptive model, Attribute-based proxy re-encryption, Key-policy, Proxy re-encryption",
author = "Chunpeng Ge and Willy Susilo and Liming Fang and Jiandong Wang and Yunqing Shi",
note = "Funding Information: Acknowledgements This work is supported by the National Natural Science Foundation of China (Nos. 61702236, 61672270, 61602216, 61272083, 61300236), the National Natural Science Foundation of Jiangsu (No. BK20130809), the National Science Foundation for Post-doctoral Scientists of China (No. 2013M530254), the National Science Foundation for Post-doctoral Scientists of Jiangsu (No. 1302137C), and the China Postdoctoral Science special Foundation (No. 2014T70518 ), the Open Fund of State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences (No. 2015-MSB-10), the Changzhou Sci & Tech Program (Grant No.CJ20179027). Funding Information: This work is supported by the National Natural Science Foundation of China (Nos. 61702236, 61672270, 61602216, 61272083, 61300236), the National Natural Science Foundation of Jiangsu (No. BK20130809), the National Science Foundation for Post-doctoral Scientists of China (No. 2013M530254), the National Science Foundation for Post-doctoral Scientists of Jiangsu (No. 1302137C), and the China Postdoctoral Science special Foundation (No. 2014T70518), the Open Fund of State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences (No. 2015-MSB-10), the Changzhou Sci & Tech Program (Grant No.CJ20179027). Publisher Copyright: {\textcopyright} 2018, Springer Science+Business Media, LLC, part of Springer Nature.",
year = "2018",
month = nov,
day = "1",
doi = "10.1007/s10623-018-0462-9",
language = "English (US)",
volume = "86",
pages = "2587--2603",
journal = "Designs, Codes, and Cryptography",
issn = "0925-1022",
publisher = "Springer Netherlands",
number = "11",
}