2008
DOI: 10.1007/s11859-008-0522-5
|View full text |Cite
|
Sign up to set email alerts
|

Attribute-based re-encryption scheme in the standard model

Abstract: In this paper, we propose a new attribute-based proxy re-encryption scheme, where a semi-trusted proxy, with some additional information, can transform a ciphertext under a set of attributes into a new ciphertext under another set of attributes on the same message, but not vice versa, furthermore, its security was proved in the standard model based on decisional bilinear Diffie-Hellman assumption. This scheme can be used to realize fine-grained selectively sharing of encrypted data, but the general proxy re-en… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(18 citation statements)
references
References 5 publications
0
18
0
Order By: Relevance
“…In this section, a quick overview of the proposed system building blocks is presented. This will be followed with a detailed literature survey of the schemes proposed to integrate ABE and PRE in order to achieve one or more of the mentioned challenges and features .…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In this section, a quick overview of the proposed system building blocks is presented. This will be followed with a detailed literature survey of the schemes proposed to integrate ABE and PRE in order to achieve one or more of the mentioned challenges and features .…”
Section: Related Workmentioning
confidence: 99%
“…Different attribute‐based proxy re‐encryption (ABPRE) schemes have evolved to overcome the mentioned PRE main limitation. ABPRE schemes have evolved into two categories, which are CP‐ABPRE and KP‐ABPRE . Generally in ABPRE schemes, data owner generates for each data consumer a secret key and a re‐encryption key associated with a set of attributes/policy.…”
Section: Related Workmentioning
confidence: 99%
“…Guo et al (Guo, Zeng, Wei, and Xu, 2008) propose a proxy re-encryption scheme based on the Goyal et al (Goyal, Pandey, Sahai, and Waters, 2006) KP-ABE scheme. The proposed scheme can transform a ciphertext associated with a set of attributes into a new ciphertext associated with another set of attributes.…”
Section: Related Workmentioning
confidence: 99%
“…The concept of our flexible attribute-based encryption is similar to the attribute-based proxy re-encryption [7,9,8].…”
Section: Related Workmentioning
confidence: 99%