Skip to main content
placeholder image

A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system

Journal Article


Abstract


  • © 2018 Springer Science+Business Media, LLC, part of Springer Nature The notion of attribute-based proxy re-encryption extends the traditional proxy re-encryption to the attribute-based setting. In an attribute-based proxy re-encryption scheme, the proxy can convert a ciphertext under one access policy to another ciphertext under a new access policy without revealing the underlying plaintext. Attribute-based proxy re-encryption has been widely used in many applications, such as personal health record and cloud data sharing systems. In this work, we propose the notion of key-policy attribute-based proxy re-encryption, which supports any monotonic access structures on users’ keys. Furthermore, our scheme is proved against chosen-ciphertext attack secure in the adaptive model.

Authors


  •   Ge, Chunpeng
  •   Susilo, Willy
  •   Fang, Liming (external author)
  •   Wang, Jiandong (external author)
  •   Shi, Yunqing (external author)

Publication Date


  • 2018

Citation


  • Ge, C., Susilo, W., Fang, L., Wang, J. & Shi, Y. (2018). A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system. Designs, Codes, and Cryptography, 86 (2587), 2603-17.

Scopus Eid


  • 2-s2.0-85045039501

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers1/1289

Number Of Pages


  • -2586

Start Page


  • 2603

End Page


  • 17

Volume


  • 86

Issue


  • 2587

Place Of Publication


  • United States

Abstract


  • © 2018 Springer Science+Business Media, LLC, part of Springer Nature The notion of attribute-based proxy re-encryption extends the traditional proxy re-encryption to the attribute-based setting. In an attribute-based proxy re-encryption scheme, the proxy can convert a ciphertext under one access policy to another ciphertext under a new access policy without revealing the underlying plaintext. Attribute-based proxy re-encryption has been widely used in many applications, such as personal health record and cloud data sharing systems. In this work, we propose the notion of key-policy attribute-based proxy re-encryption, which supports any monotonic access structures on users’ keys. Furthermore, our scheme is proved against chosen-ciphertext attack secure in the adaptive model.

Authors


  •   Ge, Chunpeng
  •   Susilo, Willy
  •   Fang, Liming (external author)
  •   Wang, Jiandong (external author)
  •   Shi, Yunqing (external author)

Publication Date


  • 2018

Citation


  • Ge, C., Susilo, W., Fang, L., Wang, J. & Shi, Y. (2018). A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system. Designs, Codes, and Cryptography, 86 (2587), 2603-17.

Scopus Eid


  • 2-s2.0-85045039501

Ro Metadata Url


  • http://ro.uow.edu.au/eispapers1/1289

Number Of Pages


  • -2586

Start Page


  • 2603

End Page


  • 17

Volume


  • 86

Issue


  • 2587

Place Of Publication


  • United States