Provably Secure Certificate-based Conditional Proxy Re-encryption

被引:1
作者
Li, Jiguo [1 ]
Zhao, Xuexia [1 ]
Zhang, Yichen [1 ]
Yao, Wei [1 ]
机构
[1] Hohai Univ, Coll Comp & Informat, Nanjing 210098, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
certificated-based encryption; proxy re-encryption; CCA security; random oracle model; security model;
D O I
10.6688/JISE.2016.32.4.1
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A proxy re-encryption scheme (PRE) allows a semi-trusted proxy to convert a ci-phertext encrypted under one key into a ciphertext encrypted under another key without leaking the underlying plaintext. In the process of the arithmetic processing, proxy should be able to learn as little information about the plaintext as possible. Conditional proxy re-encryption (CPRE) is a new cryptography primitive which only those cipher texts satisfying one condition set by the delegator can be re-encrypted correctly by the proxy. In this paper, we first propose the formal definition and security model of certificate-based conditional proxy re-encryption. Further, we combine the conditional proxy re-encryption with certificate-based encryption and present a certificate-based conditional proxy re-encryption scheme. The proposed scheme is proved secure against chosen-ciphertext attack (CCA) in the random oracle model. Security of the scheme is reduced to the intractability of the bilinear Diffie-Hellman problem. Finally, we give the efficiency analysis of our scheme.
引用
收藏
页码:813 / 830
页数:18
相关论文
共 31 条
[1]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[2]  
Ateniese G, 2009, LECT NOTES COMPUT SC, V5473, P279, DOI 10.1007/978-3-642-00862-7_19
[3]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[4]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[5]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[6]  
Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185
[7]  
Caro A., 2013, Java pairing-based cryptography library
[8]  
Chu CK, 2007, LECT NOTES COMPUT SC, V4779, P189
[9]  
Fang LM, 2009, LECT NOTES COMPUT SC, V5848, P47, DOI 10.1007/978-3-642-04642-1_6
[10]   Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement [J].
Fu, Zhangjie ;
Ren, Kui ;
Shu, Jiangang ;
Sun, Xingming ;
Huang, Fengxiao .
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2016, 27 (09) :2546-2559