Attribute based proxy re-encryption with delegating capabilities

  • Xiaohui Liang*
  • , Zhenfu Cao
  • , Huang Lin
  • , Jun Shao
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

281 Scopus citations

Abstract

Attribute based proxy re-encryption scheme (ABPRE) is a new cryptographic primitive which extends the traditional proxy re-encryption (public key or identity based cryptosystem) to the attribute based counterpart, and thus empower users with delegating capability in the access control environment. Users, identified by attributes, could freely designate a proxy who can re-encrypt a ciphertext related with a certain access policy to another one with a different access policy. The proposed scheme is proved selective-structure chosen plaintext secure and master key secure without random oracles. Besides, we develop another kind of key delegating capability in our scheme and also discuss some related issues including a stronger security model and applications.

Original languageEnglish
Title of host publicationProceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09
Pages276-286
Number of pages11
DOIs
StatePublished - 2009
Externally publishedYes
Event4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09 - Sydney, NSW, Australia
Duration: 10 Mar 200912 Mar 2009

Publication series

NameProceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09

Conference

Conference4th International Symposium on ACM Symposium on Information, Computer and Communications Security, ASIACCS'09
Country/TerritoryAustralia
CitySydney, NSW
Period10/03/0912/03/09

Keywords

  • Attribute based encryption
  • Key delegation
  • Proxy re-encryption

Fingerprint

Dive into the research topics of 'Attribute based proxy re-encryption with delegating capabilities'. Together they form a unique fingerprint.

Cite this