首页 | 本学科首页   官方微博 | 高级检索  
     检索      


A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
Authors:Chunpeng Ge  Willy Susilo  Liming Fang  Jiandong Wang  Yunqing Shi
Institution:1.Department of Computer Engineering,Jiangsu University of Technology,Zhenjiang,China;2.State Key Laboratory of Information Security, Institute of Information Engineering,Chinese Academy of Sciences,Beijing,China;3.School of Computing and Information Technology, Institute of Cybersecurity and Cryptology,University of Wollongong,Wollongong,Australia;4.College of Computer Science and Technology,Nanjing University of Aeronautics and Astronautics,Nanjing,China;5.Department of Electrical and Computer Engineering,New Jersey Institute of Technology,New Jersey,USA
Abstract:The notion of attribute-based proxy re-encryption extends the traditional proxy re-encryption to the attribute-based setting. In an attribute-based proxy re-encryption scheme, the proxy can convert a ciphertext under one access policy to another ciphertext under a new access policy without revealing the underlying plaintext. Attribute-based proxy re-encryption has been widely used in many applications, such as personal health record and cloud data sharing systems. In this work, we propose the notion of key-policy attribute-based proxy re-encryption, which supports any monotonic access structures on users’ keys. Furthermore, our scheme is proved against chosen-ciphertext attack secure in the adaptive model.
Keywords:
本文献已被 SpringerLink 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号