An encryption scheme for a secure policy updating

L. Ibraimi, Muhammad Asim, M. Petkovic

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

11 Citations (Scopus)
53 Downloads (Pure)

Abstract

Ciphertext policy attribute based encryption is an encryption technique where the data is encrypted according to an access policy over attributes. Users who have a secret key associated with a set of attributes which satisfy the access policy can decrypt the encrypted data. However, one of the drawbacks of the CP-ABE is that it does not support updating access control policies without decrypting the encrypted data. We present a new variant of the CP-ABE scheme called ciphertext policy attribute based proxy re-encryption (CP-ABPRE). The proposed scheme allows to update the access control policy of the encrypted data without decrypting the ciphertext. The scheme uses a semitrusted entity called proxy to re-encrypt the encrypted data according to a new access control policy such that only users who satisfy the new policy can decrypt the data. The construction of our scheme is based on prime order bilinear groups. We give a formal definition for semantic security and provide a security proof in the generic group model.
Original languageUndefined
Title of host publicationSECRYPT 2010, International Conference on Security and Cryptography
Place of PublicationPortugal
PublisherIEEE
Pages399-408
Number of pages10
ISBN (Print)978-989-8425-18-8
Publication statusPublished - 26 Jul 2010
Event5th International Conference on Security and Cryptography, SECRYPT 2010 - Athens, Greece
Duration: 26 Jul 201028 Jul 2010
Conference number: 5

Publication series

NameSECRYPT 2010
PublisherIEEE

Conference

Conference5th International Conference on Security and Cryptography, SECRYPT 2010
Abbreviated titleSECRYPT
CountryGreece
CityAthens
Period26/07/1028/07/10

Keywords

  • METIS-281543
  • IR-78441
  • EWI-20722
  • Encryption
  • Secure

Cite this

Ibraimi, L., Asim, M., & Petkovic, M. (2010). An encryption scheme for a secure policy updating. In SECRYPT 2010, International Conference on Security and Cryptography (pp. 399-408). (SECRYPT 2010). Portugal: IEEE.