Anonymous proxy re-encryption

被引:22
作者
Shao, Jun [1 ]
Liu, Peng [2 ]
Wei, Guiyi [1 ]
Ling, Yun [1 ]
机构
[1] Zhejiang Gongshang Univ, Coll Comp & Informat Engn, Hangzhou 310018, Zhejiang, Peoples R China
[2] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16801 USA
基金
美国国家科学基金会;
关键词
proxy re-encryption; chosen-ciphertext security; collusion resistance; anonymity; random oracle model; PUBLIC-KEY CRYPTOSYSTEM; SECURE;
D O I
10.1002/sec.326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy re-encryption (PRE) is a public key encryption that allows a semi-trusted proxy with some information (a.k.a., re-encryption key) to transform a ciphertext under one public key into another ciphertext under another public key. Because of this special property, PRE has many applications, such as the distributed file system. Some of these applications demand that the underlying PRE scheme is anonymous under chosen-ciphertext attacks (CCAs); that is, the adversary cannot identify the recipient of the original/transformed ciphertext, even if it knows the PRE key and can launch the CCA. However, to the best of our knowledge, none of the existing PRE schemes satisfy this requirement. In this work, we propose the first anonymous PRE with CCA security and collusion resistance. Our proposal is proved in the random oracle model based on the DDH assumption. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:439 / 449
页数:11
相关论文
共 50 条
  • [21] Efficient proxy re-encryption with keyword search scheme
    Guo, Lifeng
    Lu, Bo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (06): : 1221 - 1228
  • [22] Conditional Proxy Re-Encryption - A More Efficient Construction
    Vivek, S. Sree
    Selvi, S. Sharmila Deva
    Radhakishan, V.
    Rangan, C. Pandu
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 502 - +
  • [23] Certificate-Based Conditional Proxy Re-Encryption
    Li, Jiguo
    Zhao, Xuexia
    Zhang, Yichen
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 299 - 310
  • [24] Proxy re-encryption via indistinguishability obfuscation
    Ohata, Satsuya
    Matsuura, Kanta
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1786 - 1795
  • [25] Non-transferable Proxy Re-encryption
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    COMPUTER JOURNAL, 2019, 62 (04) : 490 - 506
  • [26] Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain
    Manzoor, Ahsan
    Braeken, An
    Kanhere, Salil S.
    Ylianttila, Mika
    Liyanage, Madhsanka
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 176
  • [27] Realizing Proxy Re-encryption in the Symmetric World
    Syalim, Amril
    Nishide, Takashi
    Sakurai, Kouichi
    INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 259 - 274
  • [28] A Homomorphic Proxy Re-encryption from Lattices
    Ma, Chunguang
    Li, Juyan
    Ouyang, Weiping
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 353 - 372
  • [29] Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 564 - 575
  • [30] Identity-based proxy re-encryption
    Green, Matthew
    Ateniese, Giuseppe
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 288 - +