Journal on Communications ›› 2019, Vol. 40 ›› Issue (6): 177-189.doi: 10.11959/j.issn.1000-436x.2019127

• Correspondences • Previous Articles     Next Articles

Attribute-based proxy re-encryption scheme with multiple features

FENG Chaosheng1,2,LUO Wangping1,QIN Zhiguang2,YUAN Ding1,ZOU Liping1   

  1. 1 School of Computer Science,Sichuan Normal University,Chengdu 610101,China
    2 Network and Data Security Key Laboratory of Sichuan Province,University of Electronic Science and Technology of China,Chengdu 610054,China
  • Revised:2019-05-19 Online:2019-06-25 Published:2019-07-04
  • Supported by:
    The National Key Technology R & D Program of the Ministry of Science and Technology of China(2014BAH11F02);The National Natural Science Foundation of China(61373163);Project of Network and Data Security Key Laboratory of Sichuan Province(NDS2019-1);The Postgraduate Excellent Paper Cultivation Foundation of Sichuan Normal University

Abstract:

A ideal proxy re-encryption scheme has five features,such as one-way encryption,non-interaction,repeatability,controllability and verifiability.The existing schemes,however,have only two or three of the five features,which reduces the utility of them to some extent.For this,a new ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) scheme with the above five features was proposed.In the proposed scheme,the cloud proxy server could only re-encrypt the ciphertext specified by the delegator by using the re-encryption key,and resist the collusion attack between the user and the proxy satisfying the re-encryption sharing policy.Most of encryption and decryption were outsourced to cloud servers so that it reduced the computing burden on the user’s client.The security analysis show that the proposed scheme resists the selective chosen plaintext attack (SCPA).

Key words: attribute-based encryption, proxy re-encryption, outsourcing encryption, outsourcing decryption, chosen plaintext security

CLC Number: 

No Suggested Reading articles found!