Anonymous proxy re-encryption

被引:22
|
作者
Shao, Jun [1 ]
Liu, Peng [2 ]
Wei, Guiyi [1 ]
Ling, Yun [1 ]
机构
[1] Zhejiang Gongshang Univ, Coll Comp & Informat Engn, Hangzhou 310018, Zhejiang, Peoples R China
[2] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16801 USA
基金
美国国家科学基金会;
关键词
proxy re-encryption; chosen-ciphertext security; collusion resistance; anonymity; random oracle model; PUBLIC-KEY CRYPTOSYSTEM; SECURE;
D O I
10.1002/sec.326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy re-encryption (PRE) is a public key encryption that allows a semi-trusted proxy with some information (a.k.a., re-encryption key) to transform a ciphertext under one public key into another ciphertext under another public key. Because of this special property, PRE has many applications, such as the distributed file system. Some of these applications demand that the underlying PRE scheme is anonymous under chosen-ciphertext attacks (CCAs); that is, the adversary cannot identify the recipient of the original/transformed ciphertext, even if it knows the PRE key and can launch the CCA. However, to the best of our knowledge, none of the existing PRE schemes satisfy this requirement. In this work, we propose the first anonymous PRE with CCA security and collusion resistance. Our proposal is proved in the random oracle model based on the DDH assumption. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:439 / 449
页数:11
相关论文
共 50 条
  • [1] Anonymous Attribute-Based Conditional Proxy Re-encryption
    Mao, Xianping
    Li, Xuefeng
    Wu, Xiaochuan
    Wang, Chuansheng
    Lai, Junzuo
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 95 - 110
  • [2] Accountable Anonymity: A Proxy Re-Encryption Based Anonymous Communication System
    Xu, Gang
    Aguilera, Leonardo
    Guan, Yong
    PROCEEDINGS OF THE 2012 IEEE 18TH INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS 2012), 2012, : 109 - 116
  • [3] Fuzzy conditional proxy re-encryption
    Fang LiMing
    Wang JianDong
    Ge ChunPeng
    Ren YongJun
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) : 1 - 13
  • [4] Hierarchical conditional proxy re-encryption
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 380 - 389
  • [5] Fuzzy conditional proxy re-encryption
    FANG LiMing
    WANG JianDong
    GE ChunPeng
    REN YongJun
    ScienceChina(InformationSciences), 2013, 56 (05) : 211 - 223
  • [6] Proxy re-encryption with keyword search
    Shao, Jun
    Cao, Zhenfu
    Liang, Xiaohui
    Lin, Huang
    INFORMATION SCIENCES, 2010, 180 (13) : 2576 - 2587
  • [7] Conditional Proxy Broadcast Re-Encryption
    Chu, Cheng-Kang
    Weng, Jian
    Chow, Sherman S. M.
    Zhou, Jianying
    Deng, Robert H.
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 327 - +
  • [8] Fuzzy conditional proxy re-encryption
    LiMing Fang
    JianDong Wang
    ChunPeng Ge
    YongJun Ren
    Science China Information Sciences, 2013, 56 : 1 - 13
  • [9] Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    THEORETICAL COMPUTER SCIENCE, 2012, 462 : 39 - 58
  • [10] Combined Proxy Re-encryption
    Canard, Sebastien
    Devigne, Julien
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 49 - 66