Abstract
The notion of attribute-based proxy re-encryption extends the traditional proxy re-encryption to the attribute-based setting. In an attribute-based proxy re-encryption scheme, the proxy can convert a ciphertext under one access policy to another ciphertext under a new access policy without revealing the underlying plaintext. Attribute-based proxy re-encryption has been widely used in many applications, such as personal health record and cloud data sharing systems. In this work, we propose the notion of key-policy attribute-based proxy re-encryption, which supports any monotonic access structures on users’ keys. Furthermore, our scheme is proved against chosen-ciphertext attack secure in the adaptive model.
| Original language | English (US) |
|---|---|
| Pages (from-to) | 2587-2603 |
| Number of pages | 17 |
| Journal | Designs, Codes, and Cryptography |
| Volume | 86 |
| Issue number | 11 |
| DOIs | |
| State | Published - Nov 1 2018 |
All Science Journal Classification (ASJC) codes
- Theoretical Computer Science
- Computer Science Applications
- Discrete Mathematics and Combinatorics
- Applied Mathematics
Keywords
- Adaptive model
- Attribute-based proxy re-encryption
- Key-policy
- Proxy re-encryption
Fingerprint
Dive into the research topics of 'A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver