A DFA-Based Functional Proxy Re-Encryption Scheme for Secure Public Cloud Data Sharing
- 7 August 2014
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Forensics and Security
- Vol. 9 (10), 1667-1680
- https://doi.org/10.1109/tifs.2014.2346023
Abstract
In this paper, for the first time, we define a general notion for proxy re-encryption (PRE), which we call deterministic finite automata-based functional PRE (DFA-based FPRE). Meanwhile, we propose the first and concrete DFA-based FPRE system, which adapts to our new notion. In our scheme, a message is encrypted in a ciphertext associated with an arbitrary length index string, and a decryptor is legitimate if and only if a DFA associated with his/her secret key accepts the string. Furthermore, the above encryption is allowed to be transformed to another ciphertext associated with a new string by a semitrusted proxy to whom a re-encryption key is given. Nevertheless, the proxy cannot gain access to the underlying plaintext. This new primitive can increase the flexibility of users to delegate their decryption rights to others. We also prove it as fully chosen-ciphertext secure in the standard model.Keywords
Funding Information
- Australian Research Council Linkage Project (ARC LP120200052)
- Research Grants Council, Hong Kong (CityU 121512)
This publication has 19 references indexed in Scilit:
- Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertextsTheoretical Computer Science, 2014
- Generic Construction of Chosen Ciphertext Secure Proxy Re-EncryptionLecture Notes in Computer Science, 2012
- Functional Encryption for Regular LanguagesLecture Notes in Computer Science, 2012
- Generic Constructions for Chosen-Ciphertext Secure Attribute Based EncryptionLecture Notes in Computer Science, 2011
- Hybrid Proxy Re-encryption Scheme for Attribute-Based EncryptionLecture Notes in Computer Science, 2010
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random OraclesPublished by Springer Nature ,2007
- Ciphertext-Policy Attribute-Based EncryptionPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2007
- Identity-Based Proxy Re-encryptionLecture Notes in Computer Science, 2007
- Attribute-based encryption for fine-grained access control of encrypted dataPublished by Association for Computing Machinery (ACM) ,2006
- Evaluating 2-DNF Formulas on CiphertextsLecture Notes in Computer Science, 2005