Skip to main content

Security Analysis and Improvement of An Anonymous Attribute-Based Proxy Re-encryption

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 10656))

Abstract

The ciphertext-policy attribute-based proxy re-encryption (CP-AB-PRE) is a flexible proxy re-encryption (PRE), which makes the encryptor control its encrypted data at a fine-grained level and update the access policy. However, most of constructions focuses only on the data security, rather than on user privacy protection. In order to protect users’ attribute privacy, recently, a novel secure CP-AB-PRE named anonymous CP-AB-PRE was first proposed by Zhang et al. However, we found that their scheme fails to achieve anonymity, which means that their scheme cannot realize users’ attribute privacy protection. In order to remedy this security gap, a novel anonymous CP-AB-PRE scheme is proposed, which can protect user attribute privacy by hiding the access policy. Theoretical analysis and simulation results demonstrate that our proposed scheme is secure and efficient.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457–473. Springer, Heidelberg (2005). https://doi.org/10.1007/11426639_27

    Chapter  Google Scholar 

  2. Bethencourt, J. Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007)

    Google Scholar 

  3. Goyal, V., Pandey, O., Sahai, A., et al.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM Conference on Computer and Communications Security, pp. 89–98 (2006)

    Google Scholar 

  4. Boneh, D., Waters, B.: Conjunctive, subset, and range queries on encrypted data. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 535–554. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-70936-7_29

    Chapter  Google Scholar 

  5. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). https://doi.org/10.1007/BFb0054122

    Chapter  Google Scholar 

  6. Ateniese, G., Fu, K., Green, M., et al.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)

    Article  MATH  Google Scholar 

  7. Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: ACM Conference on Computer and Communications Security, pp. 185–194 (2007)

    Google Scholar 

  8. Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288–306. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-72738-5_19

    Chapter  Google Scholar 

  9. Guo, S., Zeng, Y., Wei, J., et al.: Attribute-based re-encryption scheme in the standard model. Wuhan Univ. J. Nat. Sci. 13(5), 621–625 (2008)

    Article  MathSciNet  MATH  Google Scholar 

  10. Liang, X. Cao, Z., Lin, H., et al.: Attribute based proxy re-encryption with delegating capabilities. In: International Symposium on Information, Computer, and Communications Security, pp. 276–286 (2009)

    Google Scholar 

  11. Luo, S., Hu, J., Chen, Z.: Ciphertext policy attribute-based proxy re-encryption. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 401–415. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-17650-0_28

    Chapter  Google Scholar 

  12. Liu, Q., Wang, G., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258(3), 355–370 (2014)

    Article  Google Scholar 

  13. Zhang, L., Wu, Q., Mu, Y., et al.: Privacy-preserving and secure sharing of PHR in the cloud. J. Med. Syst. 40(12), 1–13 (2016)

    Article  Google Scholar 

  14. Kawai, Y. Takashima, K.: Fully-anonymous functional proxy-re-encryption. IACR Cryptology EPrint Archive 2013, p. 318 (2013)

    Google Scholar 

  15. Zhang, Y., Li, J., Chen, X., et al.: Anonymous attribute-based proxy re-encryption for access control in cloud computing. Secur. Commun. Netw. 9(14), 2397–2411 (2016)

    Article  Google Scholar 

  16. Shao, J.: Anonymous ID-based proxy re-encryption. In: Susilo, W., Mu, Y., Seberry, J. (eds.) ACISP 2012. LNCS, vol. 7372, pp. 364–375. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-31448-3_27

    Chapter  Google Scholar 

  17. Abdalla, M., Catalano, D., Fiore, D.: Verifiable random functions from identity-based key encapsulation. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 554–571. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-01001-9_32

    Chapter  Google Scholar 

  18. Liang, K., Fang, L., Susilo, W., et al.: A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security. In: International Conference on Intelligent Networking and Collaborative Systems, pp. 552–559 (2013)

    Google Scholar 

  19. Liang, K., Man, H.A., Liu, J.K., et al.: A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Gener. Comput. Syst. 52(C), 95–108 (2015)

    Article  Google Scholar 

  20. Zhang, Y., Chen, X., Li, J., et al.: Anonymous attribute-based encryption supporting efficient decryption test. In: ACM SIGSAC Symposium on Information, Computer and Communications Security, pp. 511–516 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Leyou Zhang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yin, H., Zhang, L. (2017). Security Analysis and Improvement of An Anonymous Attribute-Based Proxy Re-encryption. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10656. Springer, Cham. https://doi.org/10.1007/978-3-319-72389-1_28

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72389-1_28

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72388-4

  • Online ISBN: 978-3-319-72389-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics