Skip to main content
Log in

Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Li Z P, Ma C G, Wang D. Achieving multi-hop PRE via branching program. IEEE Trans Cloud Comput, 2020, 8: 45–58

    Article  Google Scholar 

  2. Li Z P, Ma C G, Wang D. Towards multi-hop homomorphic identity-based proxy re-encryption via branching program. IEEE Access, 2017, 5: 16214–16228

    Article  Google Scholar 

  3. Li Z P, Ma C G, Wang D, et al. Toward proxy re-encryption from learning with errors in the exponent. In: Proceedings of Trust Security and Privacy in Computing and Communications, 2017. 683–690

  4. Ge C P, Susilo W, Fang L, et al. A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system. Des Codes Cryptogr, 2018, 86: 2587–2603

    Article  MathSciNet  Google Scholar 

  5. Boneh D, Waters B. Constrained pseudorandom functions and their applications. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security, 2013. 280–300

  6. Kiayias A, Papadopoulos S, Triandopoulos N, et al. Delegatable pseudorandom functions and applications. In: Proceedings of Computer and Communications Security, 2013. 669–684

  7. Boyle E, Goldwasser S, Ivan I. Functional signatures and pseudorandom functions. In: Proceedings of Public Key Cryptography, 2014. 501–519

  8. Banerjee A, Fuchsbauer G, Peikert C, et al. Keyhomomorphic constrained pseudorandom functions. In: Proceedings of Theory of Cryptography Conference, 2015. 31–60

  9. Boneh D, Gennaro R, Goldfeder S, et al. Threshold cryptosystems from threshold fully homomorphic encryption. In: Proceedings of International Cryptology Conference, 2018. 565–596

Download references

Acknowledgements

This work was supported in part by National Natural Science Foundation of China (Grant No. 61802214), National Natural Science Foundation of Shandong Province, China (Grant No. ZR2019BF009), Applied Fundamental Research Project of Qingdao (Grant No. 19-6-2-6-cg), and Foundation of Guizhou Provincial Key Laboratory of Public Big Data (Grant No. 2019BDKFJJ007).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Zengpeng Li or Chunguang Ma.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Li, Z., Sharma, V., Ma, C. et al. Ciphertext-policy attribute-based proxy re-encryption via constrained PRFs. Sci. China Inf. Sci. 64, 169301 (2021). https://doi.org/10.1007/s11432-019-2856-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-019-2856-8

Navigation