메뉴 건너뛰기




Volumn 52, Issue , 2015, Pages 95-108

A secure and efficient Ciphertext-Policy Attribute-Based Proxy Re-Encryption for cloud data sharing

Author keywords

Adaptive chosen ciphertext security; Ciphertext policy attribute based encryption; Ciphertext policy attribute based proxy re encryption

Indexed keywords

DIGITAL STORAGE; MOBILE DEVICES; SECURITY OF DATA; SOCIAL NETWORKING (ONLINE); STRUCTURES (BUILT OBJECTS);

EID: 84919491069     PISSN: 0167739X     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.future.2014.11.016     Document Type: Article
Times cited : (144)

References (40)
  • 1
    • 34547273527 scopus 로고    scopus 로고
    • Attribute-based encryption for fine-grained access control of encrypted data
    • A. Juels, R.N. Wright, S.D.C. di Vimercati, ACM
    • V. Goyal, O. Pandey, A. Sahai, and B. Waters Attribute-based encryption for fine-grained access control of encrypted data A. Juels, R.N. Wright, S.D.C. di Vimercati, ACM Conference on Computer and Communications Security 2006 ACM 89 98
    • (2006) ACM Conference on Computer and Communications Security , pp. 89-98
    • Goyal, V.1    Pandey, O.2    Sahai, A.3    Waters, B.4
  • 2
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • R. Cramer, LNCS Springer Berlin, Heidelberg
    • A. Sahai, and B. Waters Fuzzy identity-based encryption R. Cramer, Advances in Cryptology - EUROCRYPT 2005 LNCS vol. 3494 2005 Springer Berlin, Heidelberg 457 473 10.1007/11426639-27
    • (2005) Advances in Cryptology - EUROCRYPT 2005 , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 3
    • 0030687206 scopus 로고    scopus 로고
    • Proxy cryptosystems: delegation of the power to decrypt ciphertexts
    • M. Mambo, and E. Okamoto Proxy cryptosystems: delegation of the power to decrypt ciphertexts IEICE Trans. E80-A 1 1997 54 63
    • (1997) IEICE Trans. , vol.E80A , Issue.1 , pp. 54-63
    • Mambo, M.1    Okamoto, E.2
  • 4
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • K. Nyberg, LNCS Springer
    • M. Blaze, G. Bleumer, and M. Strauss Divertible protocols and atomic proxy cryptography K. Nyberg, EUROCRYPT LNCS vol. 1403 1998 Springer 127 144
    • (1998) EUROCRYPT , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 5
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • G. Ateniese, K. Fu, M. Green, and S. Hohenberger Improved proxy re-encryption schemes with applications to secure distributed storage ACM Trans. Inf. Syst. Secur. 9 1 2006 1 30
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 6
    • 77952362084 scopus 로고    scopus 로고
    • Attribute based proxy re-encryption with delegating capabilities
    • W. Li, W. Susilo, U.K. Tupakula, R. Safavi-Naini, V. Varadharajan, ACM
    • X. Liang, Z. Cao, H. Lin, and J. Shao Attribute based proxy re-encryption with delegating capabilities W. Li, W. Susilo, U.K. Tupakula, R. Safavi-Naini, V. Varadharajan, ASIACCS 2009 ACM 276 286
    • (2009) ASIACCS , pp. 276-286
    • Liang, X.1    Cao, Z.2    Lin, H.3    Shao, J.4
  • 7
    • 84890070570 scopus 로고    scopus 로고
    • A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security
    • K. Liang, L. Fang, W. Susilo, and D.S. Wong A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security INCoS 2013 IEEE 552 559
    • (2013) INCoS, IEEE , pp. 552-559
    • Liang, K.1    Fang, L.2    Susilo, W.3    Wong, D.S.4
  • 10
    • 49049111604 scopus 로고    scopus 로고
    • Bounded ciphertext policy attribute based encryption
    • L. Aceto, I. Damgard, L.A. Goldberg, M.M. Halldórsson, A. Ingólfsdóttir, I. Walukiewicz, LNCS Springer
    • V. Goyal, A. Jain, O. Pandey, and A. Sahai Bounded ciphertext policy attribute based encryption L. Aceto, I. Damgrd, L.A. Goldberg, M.M. Halldórsson, A. Ingólfsdóttir, I. Walukiewicz, ICALP (2) LNCS vol. 5126 2008 Springer 579 591
    • (2008) ICALP (2) , vol.5126 , pp. 579-591
    • Goyal, V.1    Jain, A.2    Pandey, O.3    Sahai, A.4
  • 11
    • 79952521560 scopus 로고    scopus 로고
    • Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization
    • D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi, LNCS Springer
    • B. Waters Ciphertext-policy attribute-based encryption: an expressive, efficient, and provably secure realization D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi, Public Key Cryptography LNCS vol. 6571 2011 Springer 53 70
    • (2011) Public Key Cryptography , vol.6571 , pp. 53-70
    • Waters, B.1
  • 13
    • 84865452842 scopus 로고    scopus 로고
    • Functional encryption for regular languages
    • R. Safavi-Naini, R. Canetti, LNCS Springer
    • B. Waters Functional encryption for regular languages R. Safavi-Naini, R. Canetti, CRYPTO LNCS vol. 7417 2012 Springer 218 235
    • (2012) CRYPTO , vol.7417 , pp. 218-235
    • Waters, B.1
  • 14
    • 76549089793 scopus 로고    scopus 로고
    • Hidden attribute-based signatures without anonymity revocation
    • J. Li, and K. Kim Hidden attribute-based signatures without anonymity revocation Inform. Sci. 180 9 2010 1681 1689 10.1016/j.ins.2010.01.008
    • (2010) Inform. Sci. , vol.180 , Issue.9 , pp. 1681-1689
    • Li, J.1    Kim, K.2
  • 15
    • 80053563168 scopus 로고    scopus 로고
    • Enhancing attribute-based encryption with attribute hierarchy
    • J. Li, Q. Wang, C. Wang, and K. Ren Enhancing attribute-based encryption with attribute hierarchy MONET 16 5 2011 553 561 10.1007/s11036-010-0233-y
    • (2011) MONET , vol.16 , Issue.5 , pp. 553-561
    • Li, J.1    Wang, Q.2    Wang, C.3    Ren, K.4
  • 16
    • 84894634556 scopus 로고    scopus 로고
    • Securely outsourcing attribute-based encryption with checkability
    • J. Li, X. Huang, J. Li, X. Chen, and Y. Xiang Securely outsourcing attribute-based encryption with checkability IEEE Trans. Parallel Distrib. Syst. 25 8 2014 2201 2210 10.1109/TPDS.2013.271 URL: http://doi.ieeecomputersociety.org/10.1109/TPDS.2013.271
    • (2014) IEEE Trans. Parallel Distrib. Syst. , vol.25 , Issue.8 , pp. 2201-2210
    • Li, J.1    Huang, X.2    Li, J.3    Chen, X.4    Xiang, Y.5
  • 17
    • 77954635558 scopus 로고    scopus 로고
    • Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption
    • H. Gilbert, LNCS Springer
    • A.B. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters Fully secure functional encryption: attribute-based encryption and (hierarchical) inner product encryption H. Gilbert, EUROCRYPT LNCS vol. 6110 2010 Springer 62 91
    • (2010) EUROCRYPT , vol.6110 , pp. 62-91
    • Lewko, A.B.1    Okamoto, T.2    Sahai, A.3    Takashima, K.4    Waters, B.5
  • 18
    • 84865479255 scopus 로고    scopus 로고
    • New proof methods for attribute-based encryption: achieving full security through selective techniques
    • R. Safavi-Naini, R. Canetti, LNCS Springer
    • A.B. Lewko, and B. Waters New proof methods for attribute-based encryption: achieving full security through selective techniques R. Safavi-Naini, R. Canetti, CRYPTO LNCS vol. 7417 2012 Springer 180 198
    • (2012) CRYPTO , vol.7417 , pp. 180-198
    • Lewko, A.B.1    Waters, B.2
  • 19
  • 20
    • 84874289731 scopus 로고    scopus 로고
    • Proxy re-encryption in a stronger security model extended from CT-RSA2012
    • LNCS Springer
    • T. Isshiki, M.H. Nguyen, and K. Tanaka Proxy re-encryption in a stronger security model extended from CT-RSA2012 CT-RSA 2012 LNCS vol. 7779 2013 Springer 277 292
    • (2013) CT-RSA 2012 , vol.7779 , pp. 277-292
    • Isshiki, T.1    Nguyen, M.H.2    Tanaka, K.3
  • 21
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy re-encryption
    • R. Cramer, LNCS Springer
    • B. Libert, and D. Vergnaud Unidirectional chosen-ciphertext secure proxy re-encryption R. Cramer, Public Key Cryptography LNCS vol. 4939 2008 Springer 360 379
    • (2008) Public Key Cryptography , vol.4939 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2
  • 22
    • 84863280137 scopus 로고    scopus 로고
    • Generic construction of chosen ciphertext secure proxy re-encryption
    • O. Dunkelman, LNCS Springer Berlin, Heidelberg
    • G. Hanaoka, Y. Kawai, N. Kunihiro, T. Matsuda, J. Weng, R. Zhang, and Y. Zhao Generic construction of chosen ciphertext secure proxy re-encryption O. Dunkelman, Topics in Cryptology - CT-RSA 2012 LNCS vol. 7178 2012 Springer Berlin, Heidelberg 349 364 10.1007/978-3-642-27954-6-22
    • (2012) Topics in Cryptology - CT-RSA 2012 , vol.7178 , pp. 349-364
    • Hanaoka, G.1    Kawai, Y.2    Kunihiro, N.3    Matsuda, T.4    Weng, J.5    Zhang, R.6    Zhao, Y.7
  • 23
    • 77952322019 scopus 로고    scopus 로고
    • CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
    • J. Weng, M. Chen, Y. Yang, R.H. Deng, K. Chen, and F. Bao CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles Sci. China Inf. Sci. 53 3 2010 593 606
    • (2010) Sci. China Inf. Sci. , vol.53 , Issue.3 , pp. 593-606
    • Weng, J.1    Chen, M.2    Yang, Y.3    Deng, R.H.4    Chen, K.5    Bao, F.6
  • 24
    • 84907463015 scopus 로고    scopus 로고
    • Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
    • K. Liang, C. Chu, X. Tan, D.S. Wong, C. Tang, and J. Zhou Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts Theoret. Comput. Sci. 539 2014 87 105 10.1016/j.tcs.2014.04.027
    • (2014) Theoret. Comput. Sci. , vol.539 , pp. 87-105
    • Liang, K.1    Chu, C.2    Tan, X.3    Wong, D.S.4    Tang, C.5    Zhou, J.6
  • 26
    • 84875985547 scopus 로고    scopus 로고
    • A CCA-secure identity-based conditional proxy re-encryption without random oracles
    • T. Kwon, M.-K. Lee, D. Kwon, LNCS Springer
    • K. Liang, Z. Liu, X. Tan, D.S. Wong, and C. Tang A CCA-secure identity-based conditional proxy re-encryption without random oracles T. Kwon, M.-K. Lee, D. Kwon, ICISC LNCS vol. 7839 2012 Springer 231 246
    • (2012) ICISC , vol.7839 , pp. 231-246
    • Liang, K.1    Liu, Z.2    Tan, X.3    Wong, D.S.4    Tang, C.5
  • 27
    • 84883342901 scopus 로고    scopus 로고
    • A conditional proxy broadcast re-encryption scheme supporting timed-release
    • R.H. Deng, T. Feng, Lecture Notes in Computer Science Springer
    • K. Liang, Q. Huang, R. Schlegel, D.S. Wong, and C. Tang A conditional proxy broadcast re-encryption scheme supporting timed-release R.H. Deng, T. Feng, ISPEC Lecture Notes in Computer Science vol. 7863 2013 Springer 132 146
    • (2013) ISPEC , vol.7863 , pp. 132-146
    • Liang, K.1    Huang, Q.2    Schlegel, R.3    Wong, D.S.4    Tang, C.5
  • 28
    • 84910012203 scopus 로고    scopus 로고
    • Rcca-secure multi-use bidirectional proxy re-encryption with master secret security
    • S.S.M. Chow, J.K. Liu, L.C.K. Hui, S. Yiu, Lecture Notes in Computer Science Springer
    • R. Lu, X. Lin, J. Shao, and K. Liang Rcca-secure multi-use bidirectional proxy re-encryption with master secret security S.S.M. Chow, J.K. Liu, L.C.K. Hui, S. Yiu, Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings Lecture Notes in Computer Science vol. 8782 2014 Springer 194 205 10.1007/978-3-319-12475-9-14
    • (2014) Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings , vol.8782 , pp. 194-205
    • Lu, R.1    Lin, X.2    Shao, J.3    Liang, K.4
  • 29
    • 78650865160 scopus 로고    scopus 로고
    • Ciphertext policy attribute-based proxy re-encryption
    • M. Soriano, S. Qing, J. López, LNCS Springer
    • S. Luo, J. Hu, and Z. Chen Ciphertext policy attribute-based proxy re-encryption M. Soriano, S. Qing, J. López, ICICS LNCS vol. 6476 2010 Springer 401 415
    • (2010) ICICS , vol.6476 , pp. 401-415
    • Luo, S.1    Hu, J.2    Chen, Z.3
  • 30
    • 78650185456 scopus 로고    scopus 로고
    • Hybrid proxy re-encryption scheme for attribute-based encryption
    • F. Bao, M. Yung, D. Lin, J. Jing, LNCS Springer Berlin, Heidelberg
    • T. Mizuno, and H. Doi Hybrid proxy re-encryption scheme for attribute-based encryption F. Bao, M. Yung, D. Lin, J. Jing, Information Security and Cryptology LNCS vol. 6151 2011 Springer Berlin, Heidelberg 288 302 10.1007/978-3-642-16342-5-21
    • (2011) Information Security and Cryptology , vol.6151 , pp. 288-302
    • Mizuno, T.1    Doi, H.2
  • 31
    • 84858329462 scopus 로고    scopus 로고
    • Functional re-encryption and collusion-resistant obfuscation
    • R. Cramer, Lecture Notes in Computer Science Springer
    • N. Chandran, M. Chase, and V. Vaikuntanathan Functional re-encryption and collusion-resistant obfuscation R. Cramer, TCC Lecture Notes in Computer Science vol. 7194 2012 Springer 404 421
    • (2012) TCC , vol.7194 , pp. 404-421
    • Chandran, N.1    Chase, M.2    Vaikuntanathan, V.3
  • 32
    • 84901660031 scopus 로고    scopus 로고
    • An adaptively CCA-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing
    • X. Huang, J. Zhou, Lecture Notes in Computer Science Springer
    • K. Liang, M.H. Au, W. Susilo, D.S. Wong, G. Yang, and Y. Yu An adaptively CCA-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing X. Huang, J. Zhou, ISPEC Lecture Notes in Computer Science vol. 8434 2014 Springer 448 461
    • (2014) ISPEC , vol.8434 , pp. 448-461
    • Liang, K.1    Au, M.H.2    Susilo, W.3    Wong, D.S.4    Yang, G.5    Yu, Y.6
  • 34
    • 24144433396 scopus 로고    scopus 로고
    • Evaluating 2-DNF formulas on ciphertexts
    • J. Kilian, LNCS Springer
    • D. Boneh, E.-J. Goh, and K. Nissim Evaluating 2-DNF formulas on ciphertexts J. Kilian, TCC LNCS vol. 3378 2005 Springer 325 341
    • (2005) TCC , vol.3378 , pp. 325-341
    • Boneh, D.1    Goh, E.-J.2    Nissim, K.3
  • 35
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • R. Cramer, and V. Shoup Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack SIAM J. Comput. 33 1 2004 167 226
    • (2004) SIAM J. Comput. , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 36
    • 38049024484 scopus 로고    scopus 로고
    • Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles
    • T. Okamoto, X. Wang, LNCS Springer
    • M. Bellare, and S. Shoup Two-tier signatures, strongly unforgeable signatures, and Fiat-Shamir without random oracles T. Okamoto, X. Wang, Public Key Cryptography LNCS vol. 4450 2007 Springer 201 216
    • (2007) Public Key Cryptography , vol.4450 , pp. 201-216
    • Bellare, M.1    Shoup, S.2
  • 37
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • C. Cachin, J. Camenisch, LNCS Springer
    • R. Canetti, S. Halevi, and J. Katz Chosen-ciphertext security from identity-based encryption C. Cachin, J. Camenisch, EUROCRYPT LNCS vol. 3027 2004 Springer 207 222
    • (2004) EUROCRYPT , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 38
    • 35248875326 scopus 로고    scopus 로고
    • Relaxing chosen-ciphertext security
    • D. Boneh, LNCS Springer
    • R. Canetti, H. Krawczyk, and J.B. Nielsen Relaxing chosen-ciphertext security D. Boneh, CRYPTO LNCS vol. 2729 2003 Springer 565 582
    • (2003) CRYPTO , vol.2729 , pp. 565-582
    • Canetti, R.1    Krawczyk, H.2    Nielsen, J.B.3
  • 39
    • 38149038713 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption without random oracles
    • J.A. Garay, A.K. Lenstra, M. Mambo, R. Peralta, LNCS Springer
    • C.-K. Chu, and W.-G. Tzeng Identity-based proxy re-encryption without random oracles J.A. Garay, A.K. Lenstra, M. Mambo, R. Peralta, ISC LNCS vol. 4779 2007 Springer 189 202
    • (2007) ISC , vol.4779 , pp. 189-202
    • Chu, C.-K.1    Tzeng, W.-G.2
  • 40
    • 79961066267 scopus 로고    scopus 로고
    • A timed-release proxy re-encryption scheme
    • K. Emura, A. Miyaji, and K. Omote A timed-release proxy re-encryption scheme IEICE Trans. 94-A 8 2011 1682 1695
    • (2011) IEICE Trans. , vol.94A , Issue.8 , pp. 1682-1695
    • Emura, K.1    Miyaji, A.2    Omote, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.