Abstract
In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy re-encryption scheme severely can not do it, so the proposed scheme can be thought as an improvement of general traditional proxy re-encryption scheme.
Similar content being viewed by others
References
Mambo M, Okamoto E. Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts[J]. IEICE Trans on Fundamentals, 1997, E80-A(1): 54–63.
Blaze M, Bleumer G, Strauss M. Divertible Protocols and Atomic Proxy Cryptography[C]//Proceedings of Eurocrypt’98 (LNCS 1403). Heidelberg: Springer-Berlin, 1998: 127–144.
Dodis Y, Ivan A. Proxy Cryptography Revisited[C]// Proceedings of the 10th Annual Network and Distributed System Security Symposium (NDSS). San Diego: Internet Society Press, 2003: 1–20.
Ateniese G, Fu K, Green M, et al. Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage[J]. ACM Transactions on Information and System Security (TISSEC), 2006, 9(1): 1–30.
Goyal V, Pandeyy O, Sahaiz A, et al. Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data [C]//Proceedings of the 13th ACM conference on Computer and communications security. New York: ACM Press, 2006: 89–98.
Boneh D, Boyen X. Efficient Selective-ID Secure Identity-Based Encryption without Random Oracles[C]// Proceedings of Eurocrypt’2004 (LNCS 3027). Berlin: Springer-Verlag, 2004: 223–238.
Goldwasser S, Micali S. Probabilistic Encryption[J]. Journal of Computer and System Sciences, 1984, 28(2): 270–299.
Boneh D, Franklin M K. Identity-Based Encryption from the Weil Pairing[C]//CRYPTO’2001 (LNCS 2139). Santa Barbara: Springer-Verlag, 2001: 213–229.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the Natural Science Foundation of Shandong Province (Y2007G37) and the Science and Technology Development Program of Shandong Province (2007GG10001012)
Rights and permissions
About this article
Cite this article
Guo, S., Zeng, Y., Wei, J. et al. Attribute-based re-encryption scheme in the standard model. Wuhan Univ. J. Nat. Sci. 13, 621–625 (2008). https://doi.org/10.1007/s11859-008-0522-5
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11859-008-0522-5