DEVELOPMENT ON SECURITY MODELS FOR PROXY RE-ENCRYPTION SCHEMES

被引:0
|
作者
Lo, Mamadou Makhtar [1 ]
Sow, Demba [2 ]
Ben Maaouia, Mohamed [1 ]
机构
[1] UGB, Dept Math Appl, UFR SAT, Dakar, Senegal
[2] UCAD, Dept Math & Informat, FST, Dakar, Senegal
来源
JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS | 2024年 / 63卷 / 01期
关键词
proxy re-encryption; security models; public keys encryption; access delegation; cryptography;
D O I
10.17654/0972555524001
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
A proxy re-encryption is a type of public key encryption where a proxy is given the ability to transform ciphertext for one user into ciphertext for another user, without having access to either the plaintext or the decryption keys. Proxy re-encryption schemes, since their introduction in 1998 by Blaze et al. [3], are often proposed with specific security notions. We propose here to recall the most commonly used security notions and to propose standard security models for security analysis of proxy reencryption scheme. In this article, we consider the goals of confidentiality and nonmalleability, each in the context of a parametric family of attack models. For each of the resulting pairs of definitions, we prove either an implication or a separation from the other security definitions.
引用
收藏
页码:1 / 21
页数:21
相关论文
共 50 条
  • [1] Lattice-based unidirectional Proxy Re-Encryption and Proxy Re-Encryption+ schemes
    Singh, Kunwar
    Rangan, C. Pandu
    Sheshank, Samir
    Agrawal, Richa
    IET INFORMATION SECURITY, 2021, 15 (01) : 1 - 12
  • [2] Factoring-Based Proxy Re-Encryption Schemes
    Isshiki, Toshiyuki
    Manh Ha Nguyen
    Tanaka, Keisuke
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 309 - 329
  • [3] QR Code Security using Proxy Re-Encryption
    Akhil, N., V
    Vijay, Athira
    Kumar, Deepa S.
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [4] IoT device security based on proxy re-encryption
    SuHyun Kim
    ImYeong Lee
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1267 - 1273
  • [5] IoT device security based on proxy re-encryption
    Kim, SuHyun
    Lee, ImYeong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1267 - 1273
  • [6] Combined Proxy Re-encryption
    Canard, Sebastien
    Devigne, Julien
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 49 - 66
  • [7] Anonymous proxy re-encryption
    Shao, Jun
    Liu, Peng
    Wei, Guiyi
    Ling, Yun
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 439 - 449
  • [8] Proxy Re-encryption Schemes with Proxy Having Its Own Public/Private Keys
    Wei, Ping
    Wang, Xu An
    Yang, Xiaoyuan
    2010 2ND INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS PROCEEDINGS (DBTA), 2010,
  • [9] Realizing Proxy Re-encryption in the Symmetric World
    Syalim, Amril
    Nishide, Takashi
    Sakurai, Kouichi
    INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 259 - 274
  • [10] Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption
    Hayashi, Ryotaro
    Matsushita, Tatsuyuki
    Yoshida, Takuya
    Fujii, Yoshihiro
    Okada, Koji
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2011, 7038 : 210 - +