An adaptively CCA-secure ciphertext-policy attribute-based proxy re-encryption for cloud data sharing

Kaitai Liang, Man Ho Allen Au, Willy Susilo, Duncan S. Wong, Guomin Yang, Yong Yu

Research output: Chapter in book / Conference proceedingConference article published in proceeding or bookAcademic researchpeer-review

28 Citations (Scopus)


A Ciphertext-Policy Attribute-Based Proxy Re-Encryption (CP-ABPRE) employs the PRE technology in the attribute-based encryption cryptographic setting, in which the proxy is allowed to convert an encryption under an access policy to another encryption under a new access policy. CP-ABPRE is applicable to many real world applications, such as network data sharing. The existing CP-ABPRE systems, however, leave how to achieve adaptive CCA security as an interesting open problem. This paper, for the first time, proposes a new CP-ABPRE to tackle the problem by integrating the dual system encryption technology with selective proof technique. The new scheme supports any monotonic access structures. Although our scheme is built in the composite order bilinear group, it is proven adaptively CCA secure in the standard model without jeopardizing the expressiveness of access policy.
Original languageEnglish
Title of host publicationInformation Security Practice and Experience - 10th International Conference, ISPEC 2014, Proceedings
PublisherSpringer Verlag
Number of pages14
ISBN (Print)9783319063195
Publication statusPublished - 1 Jan 2014
Externally publishedYes
Event10th International Conference on Information Security Practice and Experience, ISPEC 2014 - Fuzhou, China
Duration: 5 May 20148 May 2014

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume8434 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


Conference10th International Conference on Information Security Practice and Experience, ISPEC 2014


  • Adaptive Chosen-Cipher text Security
  • Ciphertext- Policy Attribute-Based Proxy Re-Encryption
  • Ciphertext-Policy Attribute-Based Encryption

ASJC Scopus subject areas

  • Computer Science(all)
  • Theoretical Computer Science

Cite this