Time-based attribute-based proxy re-encryption with decryption key update

被引:0
|
作者
Zhao, Feixiang [1 ]
Weng, Jian [1 ,2 ,3 ]
Xie, Wenli [1 ]
Hou, Lin [1 ]
Li, Ming [1 ]
机构
[1] Jinan Univ, Guangzhou 510632, Peoples R China
[2] Natl Joint Engn Res Ctr Network Secur Detect & Pro, Guangzhou 510632, Peoples R China
[3] Guangdong Key Lab Data Secur & Privacy Preserving, Guangzhou 510632, Peoples R China
基金
中国国家自然科学基金;
关键词
Attribute-based proxy re-encryption; Key update; Time-based delegation; Honest re-encryption attacks; Decryption key exposure resistance; Learning with errors; STANDARD;
D O I
10.1007/s10623-024-01467-x
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Proxy re-encryption (PRE) is a cryptosystem that realizes efficient encrypted data sharing by allowing a third party proxy to transform a ciphertext intended for a delegator (i.e., Alice) to a ciphertext intended for a delegatee (i.e., Bob). Attribute-based proxy re-encrypftion (AB-PRE) generalizes PRE to the attribute-based scenarios, enabling fine-grained access control on ciphertexts. However, the existing AB-PRE schemes do not adequately address the following problems: (1) the risk of decryption key leakage, and (2) the need of time-based delegation. To resolve these problems, we introduce a primitive called time-based attribute-based proxy re-encryption (TB-AB-PRE) with decryption key update. TB-AB-PRE associates keys with the current time information and supports efficient periodical decryption key update for each time transition. This property guarantees that a compromise of a decryption key for some time does not breach the security of ciphertexts from the others. Leveraging this time-based property, the proposed TB-AB-PRE elegantly achieves time-based delegation which enables Alice to decide which ciphertexts can be transformed and their decryptable timeframe after being transformed. The proposed construction is proven to be secure against honest re-encryption attacks with decryption key exposure resistance, under the learning with errors assumption.
引用
收藏
页码:4099 / 4129
页数:31
相关论文
共 50 条
  • [31] Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
    Zengpeng Li
    Vishal Sharma
    Chunguang Ma
    Chunpeng Ge
    Willy Susilo
    Science China Information Sciences, 2021, 64
  • [32] Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
    Zengpeng LI
    Vishal SHARMA
    Chunguang MA
    Chunpeng GE
    Willy SUSILO
    Science China(Information Sciences), 2021, 64 (06) : 242 - 243
  • [33] HRA-secure attribute-based threshold proxy re-encryption from lattices
    Zhao, Feixiang
    Weng, Jian
    Xie, Wenli
    Li, Ming
    Weng, Jiasi
    INFORMATION SCIENCES, 2024, 655
  • [34] Verifiable attribute-based proxy re-encryption for secure public cloud data sharing
    Lin, Suqing
    Zhang, Rui
    Wang, Mingsheng
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1748 - 1758
  • [35] Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
    Li, Zengpeng
    Sharma, Vishal
    Ma, Chunguang
    Ge, Chunpeng
    Susilo, Willy
    SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (06)
  • [36] A Verifiable and Fair Attribute-Based Proxy Re-Encryption Scheme for Data Sharing in Clouds
    Ge, Chunpeng
    Susilo, Willy
    Baek, Joonsang
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2022, 19 (05) : 2907 - 2919
  • [37] Attribute-Based Re-Encryption Scheme in the Standard Model
    GUO Shanqing1
    2. State Key Laboratory of Novel Software Technology
    Wuhan University Journal of Natural Sciences, 2008, (05) : 621 - 625
  • [38] Lattice-Based HRA-secure Attribute-Based Proxy Re-Encryption in Standard Model
    Susilo, Willy
    Dutta, Priyanka
    Duong, Dung Hoang
    Roy, Partha Sarathi
    COMPUTER SECURITY - ESORICS 2021, PT II, 2021, 12973 : 169 - 191
  • [39] A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme
    Feng, Tao
    Wang, Dewei
    Gong, Renbin
    INFORMATION, 2023, 14 (05)
  • [40] Attribute-Based Encryption with Fast Decryption
    Hohenberger, Susan
    Waters, Brent
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2013, 2013, 7778 : 162 - 179