Anonymous proxy re-encryption

被引:22
作者
Shao, Jun [1 ]
Liu, Peng [2 ]
Wei, Guiyi [1 ]
Ling, Yun [1 ]
机构
[1] Zhejiang Gongshang Univ, Coll Comp & Informat Engn, Hangzhou 310018, Zhejiang, Peoples R China
[2] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16801 USA
基金
美国国家科学基金会;
关键词
proxy re-encryption; chosen-ciphertext security; collusion resistance; anonymity; random oracle model; PUBLIC-KEY CRYPTOSYSTEM; SECURE;
D O I
10.1002/sec.326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy re-encryption (PRE) is a public key encryption that allows a semi-trusted proxy with some information (a.k.a., re-encryption key) to transform a ciphertext under one public key into another ciphertext under another public key. Because of this special property, PRE has many applications, such as the distributed file system. Some of these applications demand that the underlying PRE scheme is anonymous under chosen-ciphertext attacks (CCAs); that is, the adversary cannot identify the recipient of the original/transformed ciphertext, even if it knows the PRE key and can launch the CCA. However, to the best of our knowledge, none of the existing PRE schemes satisfy this requirement. In this work, we propose the first anonymous PRE with CCA security and collusion resistance. Our proposal is proved in the random oracle model based on the DDH assumption. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:439 / 449
页数:11
相关论文
共 50 条
  • [31] Unidirectional chosen-ciphertext secure proxy re-encryption
    Libert, Benoit
    Vergnaud, Damien
    PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 360 - +
  • [32] Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
    Sur, Chul
    Jung, Chae Duk
    Park, Youngho
    Rhee, Kyung Hyune
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2010, 6109 : 214 - +
  • [33] Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
    Libert, Benoit
    Vergnaud, Damien
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (03) : 1786 - 1802
  • [34] Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption
    Yu, Zuoxia
    Au, Man Ho
    Yang, Rupeng
    Lai, Junzuo
    Xu, Qiuliang
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 659 - 672
  • [35] CCA-Secure Proxy Re-encryption without Pairings
    Shao, Jun
    Cao, Zhenfu
    PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 357 - 376
  • [36] Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation
    Lin, Han-Yu
    Tsai, Tung-Tso
    Ting, Pei-Yih
    Fan, Yan-Rong
    SENSORS, 2023, 23 (05)
  • [37] Performance Analysis of the Symmetric Proxy Re-encryption Scheme
    Meiliasari, Rizky Putri
    Syalim, Amril
    Yazid, Setiadi
    2019 4TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2019), 2019, : 91 - 96
  • [38] QR Code Security using Proxy Re-Encryption
    Akhil, N., V
    Vijay, Athira
    Kumar, Deepa S.
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [39] A Timed-Release Proxy Re-Encryption Scheme
    Emura, Keita
    Miyaji, Atsuko
    Omote, Kazumasa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (08) : 1682 - 1695
  • [40] DEVELOPMENT ON SECURITY MODELS FOR PROXY RE-ENCRYPTION SCHEMES
    Lo, Mamadou Makhtar
    Sow, Demba
    Ben Maaouia, Mohamed
    JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2024, 63 (01): : 1 - 21