Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryptionOpen Website

Published: 2017, Last Modified: 11 May 2023ICICS 2017Readers: Everyone
Abstract: We propose a hidden ciphertext-policy attribute-based proxy re-encryption scheme. A data owner can delegate the capability of transforming a ciphertext under an access policy to another one with the same plaintext but different access policy to a semi-trusted proxy. Compared with traditional schemes, our scheme can hide the user’s attributes information in the encryption and re-encryption process, which can obtain a better protection of the user’s privacy. We also prove our scheme to be fully secure under standard assumptions using the dual system technique. As far as we know, this is the first scheme to achieve all these properties simultaneously.
0 Replies

Loading