Attribute Based Proxy Re-encryption with Delegating Capabilities. Liang, X., Cao, Z., Lin, H., & Shao, J. In Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, of ASIACCS '09, pages 276--286, New York, NY, USA, 2009. ACM.
Attribute Based Proxy Re-encryption with Delegating Capabilities [link]Paper  doi  abstract   bibtex   
Attribute based proxy re-encryption scheme (ABPRE) is a new cryptographic primitive which extends the traditional proxy re-encryption (public key or identity based cryptosystem) to the attribute based counterpart, and thus empower users with delegating capability in the access control environment. Users, identified by attributes, could freely designate a proxy who can re-encrypt a ciphertext related with a certain access policy to another one with a different access policy. The proposed scheme is proved selective-structure chosen plaintext secure and master key secure without random oracles. Besides, we develop another kind of key delegating capability in our scheme and also discuss some related issues including a stronger security model and applications.
@inproceedings{liang_attribute_2009,
	address = {New York, NY, USA},
	series = {{ASIACCS} '09},
	title = {Attribute {Based} {Proxy} {Re}-encryption with {Delegating} {Capabilities}},
	isbn = {978-1-60558-394-5},
	url = {http://doi.acm.org/10.1145/1533057.1533094},
	doi = {10.1145/1533057.1533094},
	abstract = {Attribute based proxy re-encryption scheme (ABPRE) is a new cryptographic primitive which extends the traditional proxy re-encryption (public key or identity based cryptosystem) to the attribute based counterpart, and thus empower users with delegating capability in the access control environment. Users, identified by attributes, could freely designate a proxy who can re-encrypt a ciphertext related with a certain access policy to another one with a different access policy. The proposed scheme is proved selective-structure chosen plaintext secure and master key secure without random oracles. Besides, we develop another kind of key delegating capability in our scheme and also discuss some related issues including a stronger security model and applications.},
	urldate = {2014-12-25TZ},
	booktitle = {Proceedings of the 4th {International} {Symposium} on {Information}, {Computer}, and {Communications} {Security}},
	publisher = {ACM},
	author = {Liang, Xiaohui and Cao, Zhenfu and Lin, Huang and Shao, Jun},
	year = {2009},
	keywords = {attribute based encryption, key delegation, proxy re-encryption},
	pages = {276--286}
}

Downloads: 0