many users), and a ciphertext encrypted under an
access policy p
1
= [Alice AND Patient]. It is ob-
vious that only Alice satisfies the access policy p
1
and only Alice can compute the re-encryption key
rk
p
1
→p
2
, for any p
2
.
4.2 Efficiency
The size of the secret key SK
ω
depends on the number
of attributes the user possess and consists of |ω| + 1
group elements in G
0
, where |ω| is the cardinality of
ω. The size of the ciphertext C
p
depends on the size
of the access policy p
1
and has |p| +1 group elements
in G
0
, and 1 group element in G
T
. The size of the re-
encryption key rk
p
1
→p
2
depends on ω
′
which is the
smallest set which satisfies p
1
and has |ω
′
| + 1 group
elements in G
0
.
5 CONCLUSIONS AND FUTURE
WORK
In this work we present a new proxy re-encryption
scheme in the CP-ABE setting. The scheme is unidi-
rectional and allows a user (the delegator) to change
dynamically the access policy associated with the ci-
phertext, without necessarily decrypting the cipher-
text. To reduce computations performed at the del-
egators’ side and to avoid the need for the delegator
to be online all the time, the delegator computes a re-
encryption key and delegates the power to the proxy
to update the access control policy associated with ci-
phertext.
There are two interesting open problems. First, it
would be interesting to hide the access control policy
from the semi-trusted proxy and from the user who
decrypts the data since in our scheme the access pol-
icy has to be in clear in order for the user who decrypts
the data to apply the right attributes to satisfy the ac-
cess policy associated with the ciphertext. Second, we
leave as an open problem to provide a security proof
in the standard model where the problem of breaking
the scheme is reduced to a well-studied complexity-
theoretic problem.
REFERENCES
Benaloh, J. and Leichter, J. (1995). Generalized secret shar-
ing and monotone functions. In S.Goldwasser , editor,
Proceedings of Eurocrypt 1998, volume 403 of LNCS,
pages 27–35. Springer-Verlag, 1995.
Bethencourt, J. and Sahai, A. and Waters, B. Ciphertext-
policy attribute-based encryption. In D. Shands, edi-
tor, Proceedings of the 2007 IEEE Symposium on Se-
curity and Privacy, pages 321–334. IEEE Computer
Society Washington, DC, USA, 2007.
Blaze, M. and Bleumer, G., and Strauss, M. Divertible Pro-
tocols and Atomic Proxy Cryptography. In K Nyberg,
editor, Proceedings of Eurocrypt 1998, volume 1403
of LNCS, pages 127–144. Springer-Verlag, 1998.
Boneh, D. and Franklin, M. Identity-based encryption from
the weil pairing. In J. Kilian, editor, Proceedings of
Crypto 2001, volume 2139 of LNCS, pages 213–229.
Springer-Heidelberg, 2001.
Cheung, L. and Newport, C. Provably secure ciphertext
policy ABE. In Proceedings of the 14th ACM Con-
ference on Computer and Communications Security,
pages 456–465. ACM, 2007.
ElGamal, T. A public key cryptosystem and a signature
scheme based on discrete logarithms. IEEE transac-
tions on information theory, 31(4):469–472, 1985.
Goyal, V. and Pandey, O. and Sahai, A. and Waters,
B. Attribute-based encryption for fine-grained access
control of encrypted data. In Proceedings of the 13th
ACM Conference on Computer and Communications
Security, pages 89–98. ACM, 2006.
Green, M. and Ateniese, G. Identity-based proxy re-
encryption. In J. Katz and M. Yung, editors, Pro-
ceedings of Applied Cryptography and Network Secu-
rity, volume 4521 of LNCS, pages 288–306. Springer-
Heidelberg, 2007.
Guo, S. and Zeng, Y. and Wei, J. and Xu,
Q. Attribute-based re-encryption scheme in the stan-
dard model. Wuhan University Journal of Natural Sci-
ences, 13(5):621–625, 2008.
Ibraimi, L. and Tang, Q. and Hartel, P. and Jonker, W. Ef-
ficient and provable secure ciphertext-policy attribute-
based encryption schemes. In F. Bao, H. Li, and
G. Wang, editors, Proceedings of Information Secu-
rity Practice and Experience, volume 5451 of LNCS,
pages 1–12. Springer-Heidelberg, 2009.
Ivan, A. and Dodis, Y. Proxy Cryptography Revisited. In
Proceedings of the Network and Distributed System
Security Symposium. The Internet Society, 2003.
Jakobsson, M. On quorum controlled asymmetric proxy
re-encryption. In H. Imai and Y. Zheng, editors, Pro-
ceedings of Public Key Cryptography, volume 1560 of
LNCS, pages 112–121. Springer-Heidelberg, 1999.
Liang, X. and Cao, Z. and Lin, H. and Shao, J. Attribute
based proxy re-encryption with delegating capabili-
ties. In Proceedings of the 4th International Sympo-
sium on Information, Computer, and Communications
Security, pages 276–286. ACM, 2009.
Mambo, M. and Okamoto, E. Proxy cryptosystems:
delegation of the power to decrypt ciphertexts. IE-
ICE Transactions on Fundamentals of Electronics,
Communications and Computer Sciences, 80(1):54–
63, 1997.
Matsuo, T. Proxy Re-encryption Systems for Identity-
Based Encryption. In T. Takagi, T. Okamoto,
E. Okamoto, and T. Okamoto, editors, Proceedings of
SECRYPT 2010 - International Conference on Security and Cryptography
406