Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search

被引:47
作者
Fang, Liming [2 ]
Susilo, Willy [1 ]
Ge, Chunpeng [2 ]
Wang, Jiandong [2 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
关键词
Public key encryption; Conditional proxy re-encryption; Keyword search; Anonymity; Chosen-ciphertext security; PUBLIC-KEY ENCRYPTION; GUESSING ATTACKS; RANDOM ORACLES; SCHEMES;
D O I
10.1016/j.tcs.2012.08.017
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Weng et al. introduced the notion of conditional proxy re-encryption (or C-PRE, for short), whereby only the ciphertext satisfying one condition set by the delegator can be transformed by the proxy and then decrypted by delegatee. Nonetheless, they left an open problem on how to construct CCA-secure C-PRE schemes with anonymity. Fang et al. answered this question by presenting a construction of anonymous conditional proxy re-encryption (C-PRE) scheme without requiring random oracle. Nevertheless, Fang et al.'s scheme only satisfies the RCCA-security (which is a weaker variant of CCA-security assuming a harmless mauling of the challenge ciphertext is tolerated). Hence, it remains an open problem whether CCA-secure C-PRE schemes that satisfy both anonymity and full CCA-security can really be realized. Shao et al. introduced a new cryptographic primitive, called proxy re-encryption with keyword search (PRES), which is a combination of PRE and public key encryption with keyword search (PEKS), and they left an open problem on how to design an efficient unidirectional PRES scheme. In this paper, we answer the above open problems by proposing a new cryptographic primitive called conditional proxy re-encryption with keyword search (C-PRES), which combines C-PRE and PEKS. We note that there are subtleties in combining these two notions to achieve a secure scheme, and hence, the combination is not trivial. We propose a definition of security against chosen ciphertext attacks for C-PRES schemes with keyword anonymity, and thereafter present a scheme that satisfies the definition. The performance of our scheme outperforms Weng et al.'s construction, which has been regarded as the most efficient C-PRE scheme to date. (C) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:39 / 58
页数:20
相关论文
共 50 条
  • [21] A Verifiable proxy re-encryption with keyword search without Random Oracle
    Guo, Lifeng
    Lu, Bo
    Li, Xiangyu
    Xu, He
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 474 - 478
  • [22] Chosen-ciphertext attack secure public key encryption with auxiliary inputs
    Zhang, Zongyang
    Cao, Zhenfu
    Qian, Haifeng
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1404 - 1411
  • [23] Proxy Re-Encryption Conjunctive Keyword Search against Keyword Guessing Attack
    Yang, Yang
    Ma, Maode
    Lin, Bogang
    2013 COMPUTING, COMMUNICATIONS AND IT APPLICATIONS CONFERENCE (COMCOMAP), 2013, : 125 - 130
  • [24] Proxy Re-encryption with Keyword Search: New Definitions and Algorithms
    Yau, Wei-Chuen
    Phan, Raphael C. -W.
    Heng, Swee-Huay
    Goi, Bok-Min
    SECURITY TECHNOLOGY, DISASTER RECOVERY AND BUSINESS CONTINUITY, 2010, 122 : 149 - +
  • [25] Concrete chosen-ciphertext secure encryption from subgroup membership problems
    Brown, Jaimee
    Nieto, Juan Manuel Gonzalez
    Boyd, Colin
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 1 - +
  • [26] Efficient proxy re-encryption with keyword search scheme
    Guo, Lifeng
    Lu, Bo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (06): : 1221 - 1228
  • [27] Anonymous Attribute-Based Conditional Proxy Re-encryption
    Mao, Xianping
    Li, Xuefeng
    Wu, Xiaochuan
    Wang, Chuansheng
    Lai, Junzuo
    NETWORK AND SYSTEM SECURITY (NSS 2018), 2018, 11058 : 95 - 110
  • [28] A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
    Yvo Desmedt
    Rosario Gennaro
    Kaoru Kurosawa
    Victor Shoup
    Journal of Cryptology, 2010, 23 : 91 - 120
  • [29] A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
    Tang, Yongli
    Lian, Huanhuan
    Zhao, Zemao
    Yan, Xixi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (02): : 339 - 352
  • [30] An Authenticated Keyword Searchable Conditional Proxy Re-encryption Scheme in Cloud Services
    Sharma, Sumit
    Swarnakar, Ashutosh
    Babu, Ch Jayanth
    Padmavathy, R.
    Kumar, Rakesh
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,