2010
DOI: 10.1007/978-3-642-17650-0_28
|View full text |Cite
|
Sign up to set email alerts
|

Ciphertext Policy Attribute-Based Proxy Re-encryption

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
66
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 91 publications
(67 citation statements)
references
References 19 publications
0
66
0
Order By: Relevance
“…The proxy re-encryption(PRE) technique encrypts the ciphertexts with re-encryption keys and makes it possible for users to decrypt the re-encrypted ciphertexts with their own original decryption keys without changing. In [30], Luo et al realize proxy re-encryption in CP-ABE scheme, with AND-gates that support multi-value attributes, negative attributes, and wildcards, the encryptor could choose any ciphertext to re-encrypt as they like. Lai et al formalize a new cryptographic primitive called adaptable ciphertext-policy attribute-based encryption, which allows a semi-trusted proxy to modify a ciphertext under one access policy into another one of the same plaintext under any other access policies [31].…”
Section: Related Workmentioning
confidence: 99%
“…The proxy re-encryption(PRE) technique encrypts the ciphertexts with re-encryption keys and makes it possible for users to decrypt the re-encrypted ciphertexts with their own original decryption keys without changing. In [30], Luo et al realize proxy re-encryption in CP-ABE scheme, with AND-gates that support multi-value attributes, negative attributes, and wildcards, the encryptor could choose any ciphertext to re-encrypt as they like. Lai et al formalize a new cryptographic primitive called adaptable ciphertext-policy attribute-based encryption, which allows a semi-trusted proxy to modify a ciphertext under one access policy into another one of the same plaintext under any other access policies [31].…”
Section: Related Workmentioning
confidence: 99%
“…In this paper we also show that the IND-sAS-CCA-Or security implies selective collusion resistance. Note that in [22] selective collusion resistance is also called as selective master key security.…”
Section: Our Contributionsmentioning
confidence: 99%
“…Mizuno and Doi [24] proposed a hybrid PRE scheme (in general) where the scheme can bridge ABE and IBE in the sense that ciphertexts generated in the context of ABE can be converted to the ones which can be decrypted in the IBE setting. Luo et al [22] proposed a CP-ABPRE scheme which supports AND gates on multivalued and negative attributes. The aforementioned CP-ABPRE schemes, however, are only secure against CPA and supports AND gates over attributes.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Generally speaking, an ABPRE scheme has an authority, a sender, a user called a delegator who needs to delegate his/her decryption ability to someone else, a proxy who helps the delegator to generate a reencrypted ciphertext, and some receivers as participants. Recently, due to their widespread use in the realistic scenes, widespread attention was paid to ABPRE schemes by researchers and some excellent ABPRE schemes have been proposed [6][7][8][9][10][11][12].…”
Section: Introductionmentioning
confidence: 99%