A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure
نویسنده
چکیده
A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure Bin Wang Information Engineering College of Yangzhou University No.196 West HuaYang Road, Yangzhou City, Jiangsu Province, P.R.China E-mail: [email protected] Abstract: Recently, Fang et al. [6] introduced an interactive(bidirectional) conditional proxy re-encryption(C-PRE) scheme such that a proxy can only convert ciphertexts that satisfy access policy set by a delegator. Their scheme supports monotonic access policy expressed by “OR” and “AND” gates. In addition, their scheme is called interactive since generation of re-encryption keys requires interaction between the delegator and delegatee. In this paper, we study the problem of constructing a unidirectional(non-interactive) C-PRE scheme supporting non-monotonic access policy expressed by “NOT”, “OR” and “AND” gates. A security model for unidirectional C-PRE schemes is also proposed in this paper. To yield a unidirectional C-PRE scheme supporting non-monotonic access policy, we extend the unidirectional PRE scheme presented by Libert et al. [8] by using the ideas from the non-monotonic attributed based encryption (ABE) scheme presented by Ostrovsky et al. [9]. Furthermore, the security of our C-PRE scheme is proved under the modified 3-weak Decision Bilinear Diffie-Hellman Inversion assumption in the standard model.
منابع مشابه
Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme
Cloud computing has come into our daily lives. The cloud server can provide powerful computing and storage capability as services. Since the decryption algorithm for attribute-based encryption needs a lot of computations, so with the help of cloud servers many attribute-based encryption schemes are designed for practical applications in cloud computing. To the best of our knowledge there does n...
متن کاملUnidirectional Proxy Re-Encryption for Access Structure Transformation in Attribute-based Encryption Schemes
In Ciphertext Policy Attribute Based Encryption (CPABE) scheme, a user’s private key is associated with a set of attributes, and the sensitive data are encrypted under an access structure over attributes, only if the users whose attributes satisfy the access structure associated with the ciphertext can decrypt the ciphertext data. However, a limitation of the existing CP-ABE schemes is that it ...
متن کاملConditional Proxy Broadcast Re-Encryption
A proxy re-encryption (PRE) scheme supports the delegation of decryption rights via a proxy, who makes the ciphertexts decryptable by the delegatee. PRE is useful in various applications such as encrypted email forwarding. In this paper, we introduce a more generalized notion of conditional proxy broadcast re-encryption (CPBRE). A CPBRE scheme allows Alice to generate a re-encryption key for so...
متن کاملA ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds
Ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) extends the traditional Proxy ReEncryption (PRE) by allowing a semi-trusted proxy to transform a ciphertext under an access policy to another ciphertext with the same plaintext under a new access policy (i.e., attribute-based re-encryption). The proxy, however, learns nothing about the underlying plaintext. CP-ABPRE has many real ...
متن کاملChosen-Ciphertext Secure Proxy Re-Encryption Schemes without Pairings
Proxy re-encryption realizes delegation of decryption rights, enabling a proxy holding a re-encryption key to convert a ciphertext originally intended for Alice into an encryption of the same message for Bob. Proxy re-encryption is a very useful primitive, having many applications in distributed file systems, outsourced filtering of encrypted spam, access control over network storage, and so on...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2012 شماره
صفحات -
تاریخ انتشار 2012