Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption

  • Xinyu Feng
  • Cong Li
  • Dan Li
  • Yuejian Fang
  • Qingni ShenEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10631)


We propose a hidden ciphertext-policy attribute-based proxy re-encryption scheme. A data owner can delegate the capability of transforming a ciphertext under an access policy to another one with the same plaintext but different access policy to a semi-trusted proxy. Compared with traditional schemes, our scheme can hide the user’s attributes information in the encryption and re-encryption process, which can obtain a better protection of the user’s privacy. We also prove our scheme to be fully secure under standard assumptions using the dual system technique. As far as we know, this is the first scheme to achieve all these properties simultaneously.


Attribute-based proxy re-encryption Hidden policy Fully secure Delegation 



This work is supported by the National Natural Science Foundation of China under Grant No. 61672062, 61232005, and the National High Technology Research and Development Program (“863” Program) of China under Grant No. 2015AA016009.


  1. 1.
    Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)CrossRefGoogle Scholar
  2. 2.
    Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). Scholar
  3. 3.
    Chu, C.-K., Tzeng, W.-G.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 189–202. Springer, Heidelberg (2007). Scholar
  4. 4.
    Do, J.M., Song, Y.J., Park, N.: Attribute based proxy re-encryption for data confidentiality in cloud computing environments. In: First ACIS/JNU International Conference on Computers, Networks, Systems and Industrial Engineering, pp. 248–251 (2011)Google Scholar
  5. 5.
    Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288–306. Springer, Heidelberg (2007). Scholar
  6. 6.
    Green, M., Hohenberger, S., Waters, B.: Outsourcing the decryption of ABE ciphertexts. In: Usenix Conference on Security, pp. 34–34 (2011)Google Scholar
  7. 7.
    Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely obfuscating re-encryption. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 233–252. Springer, Heidelberg (2007). Scholar
  8. 8.
    Hur, J., Noh, D.K.: Attribute-based access control with efficient revocation in data outsourcing systems. IEEE Trans. Parallel Distrib. Syst. 22(7), 1214–1221 (2011)CrossRefGoogle Scholar
  9. 9.
    Lai, J., Deng, R.H., Li, Y.: Fully secure cipertext-policy hiding CP-ABE. In: Bao, F., Weng, J. (eds.) ISPEC 2011. LNCS, vol. 6672, pp. 24–39. Springer, Heidelberg (2011). Scholar
  10. 10.
    Lewko, A., Waters, B.: New proof methods for attribute-based encryption: achieving full security through selective techniques. In: Safavi-Naini, R., Canetti, R. (eds.) CRYPTO 2012. LNCS, vol. 7417, pp. 180–198. Springer, Heidelberg (2012). Scholar
  11. 11.
    Li, H., Pang, L.: Efficient and adaptively secure attribute-based proxy reencryption scheme. Int. J. Distrib. Sens. Netw. 12, 1–12 (2016)Google Scholar
  12. 12.
    Li, J., Ren, K., Zhu, B., Wan, Z.: Privacy-aware attribute-based encryption with user accountability. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 347–362. Springer, Heidelberg (2009). Scholar
  13. 13.
    Li, X., Gu, D., Ren, Y., Ding, N., Yuan, K.: Efficient ciphertext-policy attribute based encryption with hidden policy. In: Xiang, Y., Pathan, M., Tao, X., Wang, H. (eds.) IDCS 2012. LNCS, vol. 7646, pp. 146–159. Springer, Heidelberg (2012). Scholar
  14. 14.
    Liang, K., Man, H.A., Liu, J.K., Susilo, W., Wong, D.S., Yang, G., Yu, Y., Yang, A.: A secure and efficient ciphertext-policy attribute-based proxy re-encryption for cloud data sharing. Future Gener. Comput. Syst. 52(C), 95–108 (2015)CrossRefGoogle Scholar
  15. 15.
    Liang, X., Cao, Z., Lin, H., Shao, J.: Attribute based proxy re-encryption with delegating capabilities. In: AISACCS Pages, pp. 276–286 (2009)Google Scholar
  16. 16.
    Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. IEEE Trans. Inf. Theory 57(3), 1786–1802 (2011)MathSciNetCrossRefGoogle Scholar
  17. 17.
    Liu, Q., Tan, C.C., Wu, J., Wang, G.: Reliable re-encryption in unreliable clouds. In: Global Communications Conference, GLOBECOM 2011, 5–9 December 2011, Houston, Texas, USA, pp. 1–5 (2011)Google Scholar
  18. 18.
    Liu, Q., Wang, G., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258(3), 355–370 (2014)CrossRefGoogle Scholar
  19. 19.
    Luo, S., Hu, J., Chen, Z.: Ciphertext policy attribute-based proxy re-encryption. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 401–415. Springer, Heidelberg (2010). Scholar
  20. 20.
    Matsuo, T.: Proxy re-encryption systems for identity-based encryption. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 247–267. Springer, Heidelberg (2007). Scholar
  21. 21.
    Nishide, T., Yoneyama, K., Ohta, K.: Attribute-based encryption with partially hidden encryptor-specified access structures. In: Bellovin, S.M., Gennaro, R., Keromytis, A., Yung, M. (eds.) ACNS 2008. LNCS, vol. 5037, pp. 111–129. Springer, Heidelberg (2008). Scholar
  22. 22.
    Phuong, T.V.X., Yang, G., Susilo, W.: Hidden ciphertext policy attribute-based encryption under standard assumptions. IEEE Trans. Inf. Forensics Secur. 11(1), 35–45 (2015)CrossRefGoogle Scholar
  23. 23.
    Ran, C., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, pp. 185–194, October 2007Google Scholar
  24. 24.
    Seo, H.J., Kim, H.: Attribute-based proxy re-encryption with a constant number of pairing operations. J. Inf. Commun. Converg. Eng. 10(1), 53–60 (2012)Google Scholar
  25. 25.
    Seo, H., Kim, H.: Zigbee security for visitors in home automation using attribute based proxy re-encryption. In: IEEE International Symposium on Consumer Electronics, pp. 304–307 (2011)Google Scholar
  26. 26.
    Guo, S., Zeng, Y., Wei, J., Xu, Q.: Attribute-based re-encryption scheme in the standard model. Wuhan Univ. J. Nat. Sci. 13(5), 621–625 (2008)MathSciNetCrossRefGoogle Scholar
  27. 27.
    Yu, S., Wang, C., Ren, K., Lou, W.: Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Conference on Information Communications, pp. 534–542 (2010)Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Xinyu Feng
    • 1
    • 2
  • Cong Li
    • 1
    • 2
  • Dan Li
    • 1
    • 2
  • Yuejian Fang
    • 1
    • 2
  • Qingni Shen
    • 1
    • 2
    Email author
  1. 1.School of Software and MicroelectronicsPeking UniversityBeijingChina
  2. 2.National Engineering Research Center for Software EngineeringPeking UniversityBeijingChina

Personalised recommendations