DEVELOPMENT ON SECURITY MODELS FOR PROXY RE-ENCRYPTION SCHEMES

被引:0
作者
Lo, Mamadou Makhtar [1 ]
Sow, Demba [2 ]
Ben Maaouia, Mohamed [1 ]
机构
[1] UGB, Dept Math Appl, UFR SAT, Dakar, Senegal
[2] UCAD, Dept Math & Informat, FST, Dakar, Senegal
来源
JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS | 2024年 / 63卷 / 01期
关键词
proxy re-encryption; security models; public keys encryption; access delegation; cryptography;
D O I
10.17654/0972555524001
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
A proxy re-encryption is a type of public key encryption where a proxy is given the ability to transform ciphertext for one user into ciphertext for another user, without having access to either the plaintext or the decryption keys. Proxy re-encryption schemes, since their introduction in 1998 by Blaze et al. [3], are often proposed with specific security notions. We propose here to recall the most commonly used security notions and to propose standard security models for security analysis of proxy reencryption scheme. In this article, we consider the goals of confidentiality and nonmalleability, each in the context of a parametric family of attack models. For each of the resulting pairs of definitions, we prove either an implication or a separation from the other security definitions.
引用
收藏
页码:1 / 21
页数:21
相关论文
共 50 条
[21]   Fuzzy conditional proxy re-encryption [J].
LiMing Fang ;
JianDong Wang ;
ChunPeng Ge ;
YongJun Ren .
Science China Information Sciences, 2013, 56 :1-13
[22]   Proxy Impersonation Safe Conditional Proxy Re-Encryption [J].
Gandhi, Dheeraj ;
Rangan, Pandu ;
Selvi, Sharmila Deva ;
Vivek, Sree .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, :33-44
[23]   Improved Functional Proxy Re-encryption Schemes for Secure Cloud Data Sharing [J].
Wang, Xu An ;
Yang, Xiaoyuan ;
Li, Cong ;
Liu, Yudong ;
Ding, Yong .
COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2018, 15 (03) :585-614
[24]   Accountable Proxy Re-Encryption for Secure Data Sharing [J].
Guo, Hui ;
Zhang, Zhenfeng ;
Xu, Jing ;
An, Ningyu ;
Lan, Xiao .
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) :145-159
[25]   Achieving key privacy without losing CCA security in proxy re-encryption [J].
Shao, Jun ;
Liu, Peng ;
Zhou, Yuan .
JOURNAL OF SYSTEMS AND SOFTWARE, 2012, 85 (03) :655-665
[26]   Identity based Proxy Re-Encryption using Forward Security in Cloud Framework [J].
Bankar, Jaitee ;
Raghatwan, Jyoti .
2017 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION, CONTROL AND AUTOMATION (ICCUBEA), 2017,
[27]   Proxy re-encryption via indistinguishability obfuscation [J].
Ohata, Satsuya ;
Matsuura, Kanta .
SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) :1786-1795
[28]   Efficient and Secure Certificateless Proxy Re-Encryption [J].
Liu, Ya ;
Wang, Hongbing ;
Wang, Chunlu .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04) :2254-2275
[29]   Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security [J].
Guo, Lifeng ;
Hu, Lei .
COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (01) :151-157
[30]   Non-transferable Proxy Re-encryption [J].
Guo, Hui ;
Zhang, Zhenfeng ;
Xu, Jing ;
An, Ningyu .
COMPUTER JOURNAL, 2019, 62 (04) :490-506