Volume 4 - Issue 2
Key Policy Attribute-based Proxy Re-encryption and RCCA Secure Scheme
- Keying Li
School of mathematics and statistics, Xidian University, P.R.China
likeying818@163.com
- Jianfeng Wang
State Key Laboratory of Integrated Service Networks Xidian University, P.R. China
wjf01@163.com
- Yinghui Zhang
National Engineering Laboratory for Wireless Security Xian University of Posts and Telecommunications, P.R. China, State Key Laboratory of Information Security Institute of Information Engineering, Chinese Academy of Sciences, P.R. China
prrd2007@163.com
- Hua Ma
School of mathematics and statistics, Xidian University, P.R.China
ma_hua@126.com
Keywords: key policy, attribute-based encryption, proxy re-encryption, matrix access structure
Abstract
Cloud computing has come into our daily lives. The cloud server can provide powerful computing
and storage capability as services. Since the decryption algorithm for attribute-based encryption
needs a lot of computations, so with the help of cloud servers many attribute-based encryption
schemes are designed for practical applications in cloud computing. To the best of our knowledge
there does not exist any flexible key policy attribute-based proxy re-encryption (KP-AB-PRE)
scheme with matrix access structure. In this paper, we present a KP-AB-PRE scheme, in which
the cloud server can function as a proxy and deal with the attribute-based encryption (ABE) ciphertexts
directly. In the proposed scheme, the key policy is matrix access structure. We will prove our
scheme in the replayable adaptively chosen ciphertext attack (RCCA) security model. Our construction
enjoys the desirable properties of unidirectional, non-interactive, and multi-use, and the secret
key security is guaranteed.