Key Policy Attribute-based Proxy Re-encryption and
RCCA Secure Scheme


Keying Li
1+, Jianfeng Wang2, Yinghui Zhang3, and Hua Ma1
 

1School of mathematics and statistics, Xidian University, P.R.China
likeying818@163.com and ma hua@126.com


2State Key Laboratory of Integrated Service Networks, Xidian University, P.R. China
wjf01@163.com

 

3National Engineering Laboratory for Wireless Security Networks
Xi’an University of Posts and Telecommunications, P.R. China
State Key Laboratory of Information Security
Institute of Information Engineering, Chinese Academy of Sciences, P.R. China
prrd2007@163.com

 

Abstract

Cloud computing has come into our daily lives. The cloud server can provide powerful computing and storage capability as services. Since the decryption algorithm for attribute-based encryption needs a lot of computations, so with the help of cloud servers many attribute-based encryption schemes are designed for practical applications in cloud computing. To the best of our knowledge there does not exist any flexible key policy attribute-based proxy re-encryption (KP-AB-PRE) scheme with matrix access structure. In this paper, we present a KP-AB-PRE scheme, in which the cloud server can function as a proxy and deal with the attribute-based encryption (ABE) ciphertexts directly. In the proposed scheme, the key policy is matrix access structure. We will prove our scheme in the replayable adaptively chosen ciphertext attack (RCCA) security model. Our construction enjoys the desirable properties of unidirectional, non-interactive, and multi-use, and the secret key security is guaranteed.
 

Keywords: key policy, attribute-based encryption, proxy re-encryption, matrix access structure

+: Corresponding author: Keying Li||
Tel: +86-15929802458
 

Journal of Internet Services and Information Security (JISIS), 4(2): 70-82, May  2014 [pdf]