3 research outputs found

    A ciphertext-policy attribute-based proxy re-encryption scheme for data sharing in public clouds

    No full text
    Ciphertext-policy attribute-based proxy re-encryption (CP-ABPRE) extends the traditional Proxy Re-Encryption (PRE) by allowing a semi-trusted proxy to transform a ciphertext under an access policy toanother ciphertext with the same plaintext under a new access policy (i.e., attribute-based re-encryption).The proxy, however, learns nothing about the underlying plaintext. CP-ABPRE has many real world appli-cations, such as fine-grained access control in cloud storage systems and medical records sharing amongdifferent hospitals. All the existing CP-ABPRE schemes are leaving chosen-ciphertext attack (CCA) securityas an interesting open problem. This paper, for the first time, proposes a new CP-ABPRE scheme to tacklethe problem. The new scheme supports attribute-based re-encryption with any monotonic access structures.Despite being constructed in the random oracle model, our scheme can be proven CCA secure under thedecisional q-parallel bilinear Diffie–Hellman exponent assumption

    Efficient Attribute-based Proxy Re-Encryption with Constant Size Ciphertexts

    Get PDF
    Attribute-based proxy re-encryption (ABPRE) allows a semi-trusted proxy to transform an encryption under an access-policy into an encryption under a new access policy, without revealing any information about the underlying message. Such a primitive facilitates fine-grained secure sharing of encrypted data in the cloud. In its key-policy flavor, the re-encryption key is associated with an access structure that specifies which type of ciphertexts can be re-encrypted. Only two attempts have been made towards realising key-policy ABPRE (KP-ABPRE), one satisfying replayable chosen ciphertext security (RCCA security) and the other claiming to be chosen ciphertext secure (CCA secure). We show that both the systems are vulnerable to RCCA and CCA attacks respectively. We further propose a selective CCA secure KP-ABPRE scheme in this work. Since we demonstrate attacks on the only two existing RCCA secure and CCA secure schemes in the literature, our scheme becomes the first KP-ABPRE scheme satisfying selective CCA security. Moreover, our scheme has an additional attractive property, namely collusion resistance. A proxy re-encryption scheme typically consists of three parties: a delegator who delegates his decryption rights, a proxy who performs re-encryption, and a delegatee to whom the decryption power is delegated to. When a delegator wishes to share his data with a delegatee satisfying an access-policy, the proxy can collude with the malicious delegatee to attempt to obtain the private keys of the delegator during delegation period. If the private keys are exposed, security of the delegator\u27s data is completely compromised. The proxy or the delegatee can obtain all confidential data of the delegator at will at any time, even after the delegation period is over. Hence, achieving collusion resistance is indispensable to real-world applications. In this paper, we show that our construction satisfies collusion resistance. Our scheme is proven collusion resistant and selective CCA secure in the random oracle model, based on Bilinear Diffie-Hellman exponent assumption
    corecore