loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Luan Ibraimi 1 ; Muhammad Asim 2 and Milan Petković 3

Affiliations: 1 University Of Twente, Netherlands ; 2 Philips Research Eindhoven, Netherlands ; 3 Philips Research Eindhoven and Eindhoven University of Technology, Netherlands

Keyword(s): Proxy re-encryption, Attribute-based encryption, Access policy, Attribute-based proxy re-encryption.

Related Ontology Subjects/Areas/Topics: Access Control ; Cryptographic Techniques and Key Management ; Data and Application Security and Privacy ; Data Engineering ; Databases and Data Security ; Information and Systems Security ; Internet Technology ; Privacy ; Public Key Crypto Applications ; Web Information Systems and Technologies

Abstract: Ciphertext policy attribute based encryption is an encryption technique where the data is encrypted according to an access policy over attributes. Users who have a secret key associated with a set of attributes which satisfy the access policy can decrypt the encrypted data. However, one of the drawbacks of the CP-ABE is that it does not support updating access control policies without decrypting the encrypted data.We present a new variant of the CP-ABE scheme called ciphertext policy attribute based proxy re-encryption (CP-ABPRE). The proposed scheme allows to update the access control policy of the encrypted data without decrypting the ciphertext. The scheme uses a semitrusted entity called proxy to re-encrypt the encrypted data according to a new access control policy such that only users who satisfy the new policy can decrypt the data. The construction of our scheme is based on prime order bilinear groups. We give a formal definition for semantic security and provide a security p roof in the generic group model. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.191.162.73

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Ibraimi, L.; Asim, M. and Petković, M. (2010). AN ENCRYPTION SCHEME FOR A SECURE POLICY UPDATING. In Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT; ISBN 978-989-8425-18-8; ISSN 2184-3236, SciTePress, pages 399-408. DOI: 10.5220/0002994703990408

@conference{secrypt10,
author={Luan Ibraimi. and Muhammad Asim. and Milan Petković.},
title={AN ENCRYPTION SCHEME FOR A SECURE POLICY UPDATING},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT},
year={2010},
pages={399-408},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002994703990408},
isbn={978-989-8425-18-8},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2010) - SECRYPT
TI - AN ENCRYPTION SCHEME FOR A SECURE POLICY UPDATING
SN - 978-989-8425-18-8
IS - 2184-3236
AU - Ibraimi, L.
AU - Asim, M.
AU - Petković, M.
PY - 2010
SP - 399
EP - 408
DO - 10.5220/0002994703990408
PB - SciTePress