Skip to main content
Log in

Attribute-based re-encryption scheme in the standard model

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy re-encryption scheme severely can not do it, so the proposed scheme can be thought as an improvement of general traditional proxy re-encryption scheme.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Mambo M, Okamoto E. Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts[J]. IEICE Trans on Fundamentals, 1997, E80-A(1): 54–63.

    Google Scholar 

  2. Blaze M, Bleumer G, Strauss M. Divertible Protocols and Atomic Proxy Cryptography[C]//Proceedings of Eurocrypt’98 (LNCS 1403). Heidelberg: Springer-Berlin, 1998: 127–144.

    Google Scholar 

  3. Dodis Y, Ivan A. Proxy Cryptography Revisited[C]// Proceedings of the 10th Annual Network and Distributed System Security Symposium (NDSS). San Diego: Internet Society Press, 2003: 1–20.

    Google Scholar 

  4. Ateniese G, Fu K, Green M, et al. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage[J]. ACM Transactions on Information and System Security (TISSEC), 2006, 9(1): 1–30.

    Article  Google Scholar 

  5. Goyal V, Pandeyy O, Sahaiz A, et al. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data [C]//Proceedings of the 13th ACM conference on Computer and communications security. New York: ACM Press, 2006: 89–98.

    Google Scholar 

  6. Boneh D, Boyen X. Efficient Selective-ID Secure Identity-Based Encryption without Random Oracles[C]// Proceedings of Eurocrypt’2004 (LNCS 3027). Berlin: Springer-Verlag, 2004: 223–238.

    Google Scholar 

  7. Goldwasser S, Micali S. Probabilistic Encryption[J]. Journal of Computer and System Sciences, 1984, 28(2): 270–299.

    Article  MATH  MathSciNet  Google Scholar 

  8. Boneh D, Franklin M K. Identity-Based Encryption from the Weil Pairing[C]//CRYPTO’2001 (LNCS 2139). Santa Barbara: Springer-Verlag, 2001: 213–229.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qiuliang Xu.

Additional information

Foundation item: Supported by the Natural Science Foundation of Shandong Province (Y2007G37) and the Science and Technology Development Program of Shandong Province (2007GG10001012)

Rights and permissions

Reprints and permissions

About this article

Cite this article

Guo, S., Zeng, Y., Wei, J. et al. Attribute-based re-encryption scheme in the standard model. Wuhan Univ. J. Nat. Sci. 13, 621–625 (2008). https://doi.org/10.1007/s11859-008-0522-5

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-008-0522-5

Key words

CLC number

Navigation