Abstract
The notion of attribute-based proxy re-encryption extends the traditional proxy re-encryption to the attribute-based setting. In an attribute-based proxy re-encryption scheme, the proxy can convert a ciphertext under one access policy to another ciphertext under a new access policy without revealing the underlying plaintext. Attribute-based proxy re-encryption has been widely used in many applications, such as personal health record and cloud data sharing systems. In this work, we propose the notion of key-policy attribute-based proxy re-encryption, which supports any monotonic access structures on users’ keys. Furthermore, our scheme is proved against chosen-ciphertext attack secure in the adaptive model.
Original language | English (US) |
---|---|
Pages (from-to) | 2587-2603 |
Number of pages | 17 |
Journal | Designs, Codes, and Cryptography |
Volume | 86 |
Issue number | 11 |
DOIs | |
State | Published - Nov 1 2018 |
All Science Journal Classification (ASJC) codes
- Theoretical Computer Science
- Computer Science Applications
- Discrete Mathematics and Combinatorics
- Applied Mathematics
Keywords
- Adaptive model
- Attribute-based proxy re-encryption
- Key-policy
- Proxy re-encryption