Outsourcing the Re-encryption Key Generation: Flexible Ciphertext-Policy Attribute-Based Proxy Re-encryption

被引:25
|
作者
Kawai, Yutaka [1 ]
机构
[1] Mitsubishi Elect, Kamakura, Kanagawa 2478501, Japan
关键词
SCHEME;
D O I
10.1007/978-3-319-17533-1_21
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we introduce a new proxy re-encryption (PRE) in that the re-encryption key generation can be outsourced, in attribute-based encryption. We call this new notion flexible ciphertext-policy attribute-based proxy re-encryption (flexible CP-AB-PRE). In ordinary PRE scheme, re-encryption keys are generated by using user's decryption key and an access structure. So, whenever the access structure is changed, a PRE user has to generate new different re-encryption keys. In order to overcome this disadvantage of the ordinary PRE, the reencryption key generation of the proposed scheme is divided into the following two steps. First, a user generates universal re-encryption key urkS which indicates delegator's attributes set S. Second, an authority who has re-encryption secret key rsk generates ordinary re-encryption key rk(S) -> M' by using urkS, rsk, and an access structure M'. The user has only to generate single urk(S) for all re-encryption keys. By this "outsourcing", the task of re-encryption key generation for a user is reduced only to generate one urkS. Furthermore, supposing a Private Key Generator (PKG) generates urk simultaneously at the time of decryption key generation, the load of re-encryption key generation for users almost vanishes.
引用
收藏
页码:301 / 315
页数:15
相关论文
共 50 条
  • [1] Ciphertext Policy Attribute-Based Proxy Re-encryption
    Luo, Song
    Hu, Jianbin
    Chen, Zhong
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 401 - +
  • [2] Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
    Zengpeng LI
    Vishal SHARMA
    Chunguang MA
    Chunpeng GE
    Willy SUSILO
    [J]. Science China(Information Sciences), 2021, 64 (06) : 242 - 243
  • [3] Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption
    Feng, Xinyu
    Li, Cong
    Li, Dan
    Fang, Yuejian
    Shen, Qingni
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 192 - 204
  • [4] Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
    Zengpeng Li
    Vishal Sharma
    Chunguang Ma
    Chunpeng Ge
    Willy Susilo
    [J]. Science China Information Sciences, 2021, 64
  • [5] Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs
    Li, Zengpeng
    Sharma, Vishal
    Ma, Chunguang
    Ge, Chunpeng
    Susilo, Willy
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2021, 64 (06)
  • [6] A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds
    Liang, Kaitai
    Fang, Liming
    Wong, Duncan S.
    Susilo, Willy
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (08): : 2004 - 2027
  • [7] A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing
    Liang, Kaitai
    Au, Man Ho
    Liu, Joseph K.
    Susilo, Willy
    Wong, Duncan S.
    Yang, Guomin
    Yu, Yong
    Yang, Anjia
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2015, 52 : 95 - 108
  • [8] Two-layer Ciphertext-Policy Attribute-Based Proxy Re-encryption for Supporting PHR Delegation
    Wungpornpaiboon, G.
    Vasupongayya, S.
    [J]. 2015 INTERNATIONAL COMPUTER SCIENCE AND ENGINEERING CONFERENCE (ICSEC), 2015, : 302 - 307
  • [9] Revocable attribute-based proxy re-encryption
    Luo, Fucai
    Al-Kuwari, Saif
    [J]. JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) : 465 - 482
  • [10] Obfuscating Ciphertext-Policy Attribute-Based Re-Encryption for Sensor Networks with Cloud Storage
    Teng, Minyu
    Han, Jingxuan
    Xie, Jintao
    Gao, Jiayao
    Li, Jiangfeng
    Shi, Yang
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2024, 20 (05)