Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search

被引:47
作者
Fang, Liming [2 ]
Susilo, Willy [1 ]
Ge, Chunpeng [2 ]
Wang, Jiandong [2 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
关键词
Public key encryption; Conditional proxy re-encryption; Keyword search; Anonymity; Chosen-ciphertext security; PUBLIC-KEY ENCRYPTION; GUESSING ATTACKS; RANDOM ORACLES; SCHEMES;
D O I
10.1016/j.tcs.2012.08.017
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Weng et al. introduced the notion of conditional proxy re-encryption (or C-PRE, for short), whereby only the ciphertext satisfying one condition set by the delegator can be transformed by the proxy and then decrypted by delegatee. Nonetheless, they left an open problem on how to construct CCA-secure C-PRE schemes with anonymity. Fang et al. answered this question by presenting a construction of anonymous conditional proxy re-encryption (C-PRE) scheme without requiring random oracle. Nevertheless, Fang et al.'s scheme only satisfies the RCCA-security (which is a weaker variant of CCA-security assuming a harmless mauling of the challenge ciphertext is tolerated). Hence, it remains an open problem whether CCA-secure C-PRE schemes that satisfy both anonymity and full CCA-security can really be realized. Shao et al. introduced a new cryptographic primitive, called proxy re-encryption with keyword search (PRES), which is a combination of PRE and public key encryption with keyword search (PEKS), and they left an open problem on how to design an efficient unidirectional PRES scheme. In this paper, we answer the above open problems by proposing a new cryptographic primitive called conditional proxy re-encryption with keyword search (C-PRES), which combines C-PRE and PEKS. We note that there are subtleties in combining these two notions to achieve a secure scheme, and hence, the combination is not trivial. We propose a definition of security against chosen ciphertext attacks for C-PRES schemes with keyword anonymity, and thereafter present a scheme that satisfies the definition. The performance of our scheme outperforms Weng et al.'s construction, which has been regarded as the most efficient C-PRE scheme to date. (C) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:39 / 58
页数:20
相关论文
共 50 条
[31]   A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing [J].
Tang, Yongli ;
Lian, Huanhuan ;
Zhao, Zemao ;
Yan, Xixi .
CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (02) :339-352
[32]   Designated server proxy re-encryption with boolean keyword search for E-Health Clouds [J].
Hu, Boli ;
Zhang, Kai ;
Gong, Junqing ;
Wei, Lifei ;
Ning, Jianting .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2024, 83
[33]   Efficient and Secure Certificateless Proxy Re-Encryption [J].
Liu, Ya ;
Wang, Hongbing ;
Wang, Chunlu .
KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04) :2254-2275
[34]   Fuzzy conditional proxy re-encryption [J].
Fang LiMing ;
Wang JianDong ;
Ge ChunPeng ;
Ren YongJun .
SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) :1-13
[35]   On the Security of a Conditional Proxy Re-Encryption [J].
Zhang, Xi ;
Chen, Min-Rong .
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10) :2644-2647
[36]   A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage [J].
Zeng, Peng ;
Choo, Kim-Kwang Raymond .
IEEE ACCESS, 2018, 6 :70017-70024
[37]   Fuzzy conditional proxy re-encryption [J].
FANG LiMing ;
WANG JianDong ;
GE ChunPeng ;
REN YongJun .
Science China(Information Sciences), 2013, 56 (05) :211-223
[38]   Efficient Chosen-Ciphertext Secure Encryption from R-LWE [J].
Wang, Ting ;
Han, Guoqiang ;
Yu, Jianping ;
Zhang, Peng ;
Sun, Xiaoqiang .
WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) :2973-2988
[39]   Conditional Proxy Broadcast Re-Encryption [J].
Chu, Cheng-Kang ;
Weng, Jian ;
Chow, Sherman S. M. ;
Zhou, Jianying ;
Deng, Robert H. .
INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 :327-+
[40]   Fuzzy conditional proxy re-encryption [J].
LiMing Fang ;
JianDong Wang ;
ChunPeng Ge ;
YongJun Ren .
Science China Information Sciences, 2013, 56 :1-13