Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-Encryption

Xinyu Feng,Cong Li,Dan Li,Yuejian Fang,Qingni Shen
DOI: https://doi.org/10.1007/978-3-319-89500-0_17
2017-01-01
Abstract:We propose a hidden ciphertext-policy attribute-based proxy re-encryption scheme. A data owner can delegate the capability of transforming a ciphertext under an access policy to another one with the same plaintext but different access policy to a semi-trusted proxy. Compared with traditional schemes, our scheme can hide the user's attributes information in the encryption and re-encryption process, which can obtain a better protection of the user's privacy. We also prove our scheme to be fully secure under standard assumptions using the dual system technique. As far as we know, this is the first scheme to achieve all these properties simultaneously.
What problem does this paper attempt to address?