A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure

نویسنده

  • Bin Wang
چکیده

A unidirectional conditional proxy re-encryption scheme based on non-monotonic access structure Bin Wang Information Engineering College of Yangzhou University No.196 West HuaYang Road, Yangzhou City, Jiangsu Province, P.R.China E-mail: [email protected] Abstract: Recently, Fang et al. [6] introduced an interactive(bidirectional) conditional proxy re-encryption(C-PRE) scheme such that a proxy can only convert ciphertexts that satisfy access policy set by a delegator. Their scheme supports monotonic access policy expressed by “OR” and “AND” gates. In addition, their scheme is called interactive since generation of re-encryption keys requires interaction between the delegator and delegatee. In this paper, we study the problem of constructing a unidirectional(non-interactive) C-PRE scheme supporting non-monotonic access policy expressed by “NOT”, “OR” and “AND” gates. A security model for unidirectional C-PRE schemes is also proposed in this paper. To yield a unidirectional C-PRE scheme supporting non-monotonic access policy, we extend the unidirectional PRE scheme presented by Libert et al. [8] by using the ideas from the non-monotonic attributed based encryption (ABE) scheme presented by Ostrovsky et al. [9]. Furthermore, the security of our C-PRE scheme is proved under the modified 3-weak Decision Bilinear Diffie-Hellman Inversion assumption in the standard model.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme

Cloud computing has come into our daily lives. The cloud server can provide powerful computing and storage capability as services. Since the decryption algorithm for attribute-based encryption needs a lot of computations, so with the help of cloud servers many attribute-based encryption schemes are designed for practical applications in cloud computing. To the best of our knowledge there does n...

متن کامل

Unidirectional Proxy Re-Encryption for Access Structure Transformation in Attribute-based Encryption Schemes

In Ciphertext Policy Attribute Based Encryption (CPABE) scheme, a user’s private key is associated with a set of attributes, and the sensitive data are encrypted under an access structure over attributes, only if the users whose attributes satisfy the access structure associated with the ciphertext can decrypt the ciphertext data. However, a limitation of the existing CP-ABE schemes is that it ...

متن کامل

Conditional Proxy Broadcast Re-Encryption

A proxy re-encryption (PRE) scheme supports the delegation of decryption rights via a proxy, who makes the ciphertexts decryptable by the delegatee. PRE is useful in various applications such as encrypted email forwarding. In this paper, we introduce a more generalized notion of conditional proxy broadcast re-encryption (CPBRE). A CPBRE scheme allows Alice to generate a re-encryption key for so...

متن کامل

A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds

Ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) extends the traditional Proxy ReEncryption (PRE) by allowing a semi-trusted proxy to transform a ciphertext under an access policy to another ciphertext with the same plaintext under a new access policy (i.e., attribute-based re-encryption). The proxy, however, learns nothing about the underlying plaintext. CP-ABPRE has many real ...

متن کامل

Chosen-Ciphertext Secure Proxy Re-Encryption Schemes without Pairings

Proxy re-encryption realizes delegation of decryption rights, enabling a proxy holding a re-encryption key to convert a ciphertext originally intended for Alice into an encryption of the same message for Bob. Proxy re-encryption is a very useful primitive, having many applications in distributed file systems, outsourced filtering of encrypted spam, access control over network storage, and so on...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2012  شماره 

صفحات  -

تاریخ انتشار 2012