loading
Papers

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Luan Ibraimi 1 ; Muhammad Asim 2 and Milan Petković 3

Affiliations: 1 University Of Twente, Netherlands ; 2 Philips Research Eindhoven, Netherlands ; 3 Philips Research Eindhoven and Eindhoven University of Technology, Netherlands

ISBN: 978-989-8425-18-8

Keyword(s): Proxy re-encryption, Attribute-based encryption, Access policy, Attribute-based proxy re-encryption.

Related Ontology Subjects/Areas/Topics: Access Control ; Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Internet Technology ; Privacy ; Public Key Crypto Applications ; Web Information Systems and Technologies

Abstract: Ciphertext policy attribute based encryption is an encryption technique where the data is encrypted according to an access policy over attributes. Users who have a secret key associated with a set of attributes which satisfy the access policy can decrypt the encrypted data. However, one of the drawbacks of the CP-ABE is that it does not support updating access control policies without decrypting the encrypted data.We present a new variant of the CP-ABE scheme called ciphertext policy attribute based proxy re-encryption (CP-ABPRE). The proposed scheme allows to update the access control policy of the encrypted data without decrypting the ciphertext. The scheme uses a semitrusted entity called proxy to re-encrypt the encrypted data according to a new access control policy such that only users who satisfy the new policy can decrypt the data. The construction of our scheme is based on prime order bilinear groups. We give a formal definition for semantic security and provide a security pr oof in the generic group model. (More)

PDF ImageFull Text

Download
CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 34.204.173.36

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Ibraimi L.; Asim M.; Petković M. and (2010). AN ENCRYPTION SCHEME FOR A SECURE POLICY UPDATING.In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010) ISBN 978-989-8425-18-8, pages 399-408. DOI: 10.5220/0002994703990408

@conference{secrypt10,
author={Luan Ibraimi and Muhammad Asim and Milan Petković},
title={AN ENCRYPTION SCHEME FOR A SECURE POLICY UPDATING},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)},
year={2010},
pages={399-408},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002994703990408},
isbn={978-989-8425-18-8},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2010)
TI - AN ENCRYPTION SCHEME FOR A SECURE POLICY UPDATING
SN - 978-989-8425-18-8
AU - Ibraimi, L.
AU - Asim, M.
AU - Petković, M.
PY - 2010
SP - 399
EP - 408
DO - 10.5220/0002994703990408

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.