Time-based attribute-based proxy re-encryption with decryption key update

被引:0
|
作者
Zhao, Feixiang [1 ]
Weng, Jian [1 ,2 ,3 ]
Xie, Wenli [1 ]
Hou, Lin [1 ]
Li, Ming [1 ]
机构
[1] Jinan Univ, Guangzhou 510632, Peoples R China
[2] Natl Joint Engn Res Ctr Network Secur Detect & Pro, Guangzhou 510632, Peoples R China
[3] Guangdong Key Lab Data Secur & Privacy Preserving, Guangzhou 510632, Peoples R China
基金
中国国家自然科学基金;
关键词
Attribute-based proxy re-encryption; Key update; Time-based delegation; Honest re-encryption attacks; Decryption key exposure resistance; Learning with errors; STANDARD;
D O I
10.1007/s10623-024-01467-x
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Proxy re-encryption (PRE) is a cryptosystem that realizes efficient encrypted data sharing by allowing a third party proxy to transform a ciphertext intended for a delegator (i.e., Alice) to a ciphertext intended for a delegatee (i.e., Bob). Attribute-based proxy re-encrypftion (AB-PRE) generalizes PRE to the attribute-based scenarios, enabling fine-grained access control on ciphertexts. However, the existing AB-PRE schemes do not adequately address the following problems: (1) the risk of decryption key leakage, and (2) the need of time-based delegation. To resolve these problems, we introduce a primitive called time-based attribute-based proxy re-encryption (TB-AB-PRE) with decryption key update. TB-AB-PRE associates keys with the current time information and supports efficient periodical decryption key update for each time transition. This property guarantees that a compromise of a decryption key for some time does not breach the security of ciphertexts from the others. Leveraging this time-based property, the proposed TB-AB-PRE elegantly achieves time-based delegation which enables Alice to decide which ciphertexts can be transformed and their decryptable timeframe after being transformed. The proposed construction is proven to be secure against honest re-encryption attacks with decryption key exposure resistance, under the learning with errors assumption.
引用
收藏
页码:4099 / 4129
页数:31
相关论文
共 50 条
  • [1] Revocable attribute-based proxy re-encryption
    Luo, Fucai
    Al-Kuwari, Saif
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) : 465 - 482
  • [2] Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption
    Mizuno, Takeo
    Doi, Hiroshi
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 288 - +
  • [3] Attribute-Based Proxy Re-Encryption with Keyword Search
    Shi, Yanfeng
    Liu, Jiqiang
    Han, Zhen
    Zheng, Qingji
    Zhang, Rui
    Qiu, Shuo
    PLOS ONE, 2014, 9 (12):
  • [4] Anonymous Attribute-Based Conditional Proxy Re-encryption
    Mao, Xianping
    Li, Xuefeng
    Wu, Xiaochuan
    Wang, Chuansheng
    Lai, Junzuo
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 95 - 110
  • [5] Attribute-Based Proxy Re-Encryption with Dynamic Membership
    Fan, Chun-I
    Wu, Chien-Nan
    Chen, Chun-Hung
    Tseng, Yi-Fan
    Feng, Cheng-Chun
    2015 10TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS), 2015, : 26 - 32
  • [6] Ciphertext Policy Attribute-Based Proxy Re-encryption
    Luo, Song
    Hu, Jianbin
    Chen, Zhong
    INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 401 - +
  • [7] Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption
    Kawai, Yutaka
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 301 - 315
  • [8] Attribute-Based Keyword Search with Proxy Re-Encryption in the Cloud
    Chen, Yanli
    Hu, Yuanyuan
    Zhu, Minhui
    Yang, Geng
    IEICE TRANSACTIONS ON COMMUNICATIONS, 2018, E101B (08) : 1798 - 1808
  • [9] Attribute-based proxy re-encryption from standard lattices
    Luo, Fucai
    Al-Kuwari, Saif
    Wang, Fuqun
    Chen, Kefei
    Theoretical Computer Science, 2021, 865 : 52 - 62
  • [10] Attribute-based proxy re-encryption scheme with multiple features
    Feng C.
    Luo W.
    Qin Z.
    Yuan D.
    Zou L.
    Tongxin Xuebao/Journal on Communications, 2019, 40 (06): : 177 - 189