A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system

Chunpeng Ge, Willy Susilo, Liming Fang, Jiandong Wang, Yunqing Shi

Research output: Contribution to journalArticlepeer-review

37 Scopus citations

Abstract

The notion of attribute-based proxy re-encryption extends the traditional proxy re-encryption to the attribute-based setting. In an attribute-based proxy re-encryption scheme, the proxy can convert a ciphertext under one access policy to another ciphertext under a new access policy without revealing the underlying plaintext. Attribute-based proxy re-encryption has been widely used in many applications, such as personal health record and cloud data sharing systems. In this work, we propose the notion of key-policy attribute-based proxy re-encryption, which supports any monotonic access structures on users’ keys. Furthermore, our scheme is proved against chosen-ciphertext attack secure in the adaptive model.

Original languageEnglish (US)
Pages (from-to)2587-2603
Number of pages17
JournalDesigns, Codes, and Cryptography
Volume86
Issue number11
DOIs
StatePublished - Nov 1 2018

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Applied Mathematics

Keywords

  • Adaptive model
  • Attribute-based proxy re-encryption
  • Key-policy
  • Proxy re-encryption

Fingerprint

Dive into the research topics of 'A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system'. Together they form a unique fingerprint.

Cite this