An efficient cryptography-based access control using inner-product proxy re-encryption scheme

Masoomeh Sepehri, Alberto Trombetta, Maryam Sepehri, Ernesto Damiani

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Scopus citations

Abstract

Inner-product encryption (IPE) is a well-known functional encryption primitive that allows decryption when the inner-product of the attribute vectors, upon which the encrypted data and the decryption key depend, is equal to zero. Using IPE, it is possible to define fine-grained access policies over encrypted data whose enforcement can be outsourced to the cloud where the data are stored. However, current IPE schemes do not support efficient access policy changes. In this paper, we propose an efficient inner-product proxy re-encryption (E-IPPRE) scheme that provides the proxy server with a transformation key, with which a ciphertext associated with an attribute vector can be transformed to a new ciphertext associated with a different attribute vector, providing a policy update mechanism with a performance suitable for many practical applications. We experimentally assess the efficiency of our protocol and show that it is selective attribute-secure against chosen-plaintext attacks in the standard model under the Asymmetric Decisional Bilinear Diffie-Hellman assumption.

Original languageBritish English
Title of host publicationARES 2018 - 13th International Conference on Availability, Reliability and Security
ISBN (Electronic)9781450364485
DOIs
StatePublished - 27 Aug 2018
Event13th International Conference on Availability, Reliability and Security, ARES 2018 - Hamburg, Germany
Duration: 27 Aug 201830 Aug 2018

Publication series

NameACM International Conference Proceeding Series

Conference

Conference13th International Conference on Availability, Reliability and Security, ARES 2018
Country/TerritoryGermany
CityHamburg
Period27/08/1830/08/18

Keywords

  • Fine-grained access control
  • Inner-product encryption
  • Proxy re-encryption
  • Secure data sharing

Fingerprint

Dive into the research topics of 'An efficient cryptography-based access control using inner-product proxy re-encryption scheme'. Together they form a unique fingerprint.

Cite this