Attribute-based proxy re-encryption scheme with multiple features
A ideal proxy re-encryption scheme has five features,such as one-way encryption,non-interaction,repeatability,controllability and verifiability.The existing schemes,however,have only two or three of the five features,which reduces the utility of them to some extent.For this,a new ciphertext-policy a...
Saved in:
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2019-06-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019127/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841539326507220992 |
---|---|
author | Chaosheng FENG Wangping LUO Zhiguang QIN Ding YUAN Liping ZOU |
author_facet | Chaosheng FENG Wangping LUO Zhiguang QIN Ding YUAN Liping ZOU |
author_sort | Chaosheng FENG |
collection | DOAJ |
description | A ideal proxy re-encryption scheme has five features,such as one-way encryption,non-interaction,repeatability,controllability and verifiability.The existing schemes,however,have only two or three of the five features,which reduces the utility of them to some extent.For this,a new ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) scheme with the above five features was proposed.In the proposed scheme,the cloud proxy server could only re-encrypt the ciphertext specified by the delegator by using the re-encryption key,and resist the collusion attack between the user and the proxy satisfying the re-encryption sharing policy.Most of encryption and decryption were outsourced to cloud servers so that it reduced the computing burden on the user’s client.The security analysis show that the proposed scheme resists the selective chosen plaintext attack (SCPA). |
format | Article |
id | doaj-art-1286dbd432f9473f89b35c026f30e39d |
institution | Kabale University |
issn | 1000-436X |
language | zho |
publishDate | 2019-06-01 |
publisher | Editorial Department of Journal on Communications |
record_format | Article |
series | Tongxin xuebao |
spelling | doaj-art-1286dbd432f9473f89b35c026f30e39d2025-01-14T07:17:12ZzhoEditorial Department of Journal on CommunicationsTongxin xuebao1000-436X2019-06-014017718959727977Attribute-based proxy re-encryption scheme with multiple featuresChaosheng FENGWangping LUOZhiguang QINDing YUANLiping ZOUA ideal proxy re-encryption scheme has five features,such as one-way encryption,non-interaction,repeatability,controllability and verifiability.The existing schemes,however,have only two or three of the five features,which reduces the utility of them to some extent.For this,a new ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) scheme with the above five features was proposed.In the proposed scheme,the cloud proxy server could only re-encrypt the ciphertext specified by the delegator by using the re-encryption key,and resist the collusion attack between the user and the proxy satisfying the re-encryption sharing policy.Most of encryption and decryption were outsourced to cloud servers so that it reduced the computing burden on the user’s client.The security analysis show that the proposed scheme resists the selective chosen plaintext attack (SCPA).http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019127/attribute-based encryptionproxy re-encryptionoutsourcing encryptionoutsourcing decryptionchosen plaintext security |
spellingShingle | Chaosheng FENG Wangping LUO Zhiguang QIN Ding YUAN Liping ZOU Attribute-based proxy re-encryption scheme with multiple features Tongxin xuebao attribute-based encryption proxy re-encryption outsourcing encryption outsourcing decryption chosen plaintext security |
title | Attribute-based proxy re-encryption scheme with multiple features |
title_full | Attribute-based proxy re-encryption scheme with multiple features |
title_fullStr | Attribute-based proxy re-encryption scheme with multiple features |
title_full_unstemmed | Attribute-based proxy re-encryption scheme with multiple features |
title_short | Attribute-based proxy re-encryption scheme with multiple features |
title_sort | attribute based proxy re encryption scheme with multiple features |
topic | attribute-based encryption proxy re-encryption outsourcing encryption outsourcing decryption chosen plaintext security |
url | http://www.joconline.com.cn/zh/article/doi/10.11959/j.issn.1000-436x.2019127/ |
work_keys_str_mv | AT chaoshengfeng attributebasedproxyreencryptionschemewithmultiplefeatures AT wangpingluo attributebasedproxyreencryptionschemewithmultiplefeatures AT zhiguangqin attributebasedproxyreencryptionschemewithmultiplefeatures AT dingyuan attributebasedproxyreencryptionschemewithmultiplefeatures AT lipingzou attributebasedproxyreencryptionschemewithmultiplefeatures |