Attribute-based proxy re-encryption scheme with multiple features

A ideal proxy re-encryption scheme has five features,such as one-way encryption,non-interaction,repeatability,controllability and verifiability.The existing schemes,however,have only two or three of the five features,which reduces the utility of them to some extent.For this,a new ciphertext-policy a...

Full description

Saved in:
Bibliographic Details
Main Authors: Chaosheng FENG, Wangping LUO, Zhiguang QIN, Ding YUAN, Liping ZOU
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2019-06-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019127/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841539326507220992
author Chaosheng FENG
Wangping LUO
Zhiguang QIN
Ding YUAN
Liping ZOU
author_facet Chaosheng FENG
Wangping LUO
Zhiguang QIN
Ding YUAN
Liping ZOU
author_sort Chaosheng FENG
collection DOAJ
description A ideal proxy re-encryption scheme has five features,such as one-way encryption,non-interaction,repeatability,controllability and verifiability.The existing schemes,however,have only two or three of the five features,which reduces the utility of them to some extent.For this,a new ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) scheme with the above five features was proposed.In the proposed scheme,the cloud proxy server could only re-encrypt the ciphertext specified by the delegator by using the re-encryption key,and resist the collusion attack between the user and the proxy satisfying the re-encryption sharing policy.Most of encryption and decryption were outsourced to cloud servers so that it reduced the computing burden on the user’s client.The security analysis show that the proposed scheme resists the selective chosen plaintext attack (SCPA).
format Article
id doaj-art-1286dbd432f9473f89b35c026f30e39d
institution Kabale University
issn 1000-436X
language zho
publishDate 2019-06-01
publisher Editorial Department of Journal on Communications
record_format Article
series Tongxin xuebao
spelling doaj-art-1286dbd432f9473f89b35c026f30e39d2025-01-14T07:17:12ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2019-06-014017718959727977Attribute-based proxy re-encryption scheme with multiple featuresChaosheng FENGWangping LUOZhiguang QINDing YUANLiping ZOUA ideal proxy re-encryption scheme has five features,such as one-way encryption,non-interaction,repeatability,controllability and verifiability.The existing schemes,however,have only two or three of the five features,which reduces the utility of them to some extent.For this,a new ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) scheme with the above five features was proposed.In the proposed scheme,the cloud proxy server could only re-encrypt the ciphertext specified by the delegator by using the re-encryption key,and resist the collusion attack between the user and the proxy satisfying the re-encryption sharing policy.Most of encryption and decryption were outsourced to cloud servers so that it reduced the computing burden on the user’s client.The security analysis show that the proposed scheme resists the selective chosen plaintext attack (SCPA).http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019127/attribute-based encryptionproxy re-encryptionoutsourcing encryptionoutsourcing decryptionchosen plaintext security
spellingShingle Chaosheng FENG
Wangping LUO
Zhiguang QIN
Ding YUAN
Liping ZOU
Attribute-based proxy re-encryption scheme with multiple features
Tongxin xuebao
attribute-based encryption
proxy re-encryption
outsourcing encryption
outsourcing decryption
chosen plaintext security
title Attribute-based proxy re-encryption scheme with multiple features
title_full Attribute-based proxy re-encryption scheme with multiple features
title_fullStr Attribute-based proxy re-encryption scheme with multiple features
title_full_unstemmed Attribute-based proxy re-encryption scheme with multiple features
title_short Attribute-based proxy re-encryption scheme with multiple features
title_sort attribute based proxy re encryption scheme with multiple features
topic attribute-based encryption
proxy re-encryption
outsourcing encryption
outsourcing decryption
chosen plaintext security
url http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019127/
work_keys_str_mv AT chaoshengfeng attributebasedproxyreencryptionschemewithmultiplefeatures
AT wangpingluo attributebasedproxyreencryptionschemewithmultiplefeatures
AT zhiguangqin attributebasedproxyreencryptionschemewithmultiplefeatures
AT dingyuan attributebasedproxyreencryptionschemewithmultiplefeatures
AT lipingzou attributebasedproxyreencryptionschemewithmultiplefeatures