Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts

被引:7
|
作者
Kawai, Yutaka [1 ]
Matsuda, Takahiro [2 ]
Hirano, Takato [1 ]
Koseki, Yoshihiro [1 ]
Hanaoka, Goichiro [2 ]
机构
[1] Mitsubishi Elect, Kamakura, Kanagawa 2478501, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tokyo 1350064, Japan
来源
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | 2019年 / E102A卷 / 01期
基金
日本科学技术振兴机构;
关键词
Proxy Re-encryption; homomorphic encryption; SIGNATURES; MULTISIGNATURES; SECURITY; SCHEME;
D O I
10.1587/transfun.E102.A.81
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Homomorphic encryption (HE) is useful to analyze encrypted data without decrypting it. However, by using ordinary HE, a user who can decrypt a ciphertext that is generated by executing homomorphic operations, can also decrypt ciphertexts on which homomorphic evaluations have not been performed, since homomorphic operations cannot be executed among ciphertexts which are encrypted under different public keys. To resolve the above problem, we introduce a new cryptographic primitive called Homomorphic Proxy Re-Encryption (HPRE) combining the "key-switching" property of Proxy Re-Encryption (PRE) and the homomorphic property of HE. In our HPRE, original ciphertexts (which have not been re-encrypted) guarantee CCA2 security (and in particular satisfy non-malleability). On the other hand, re-encrypted ciphertexts only guarantee CPA security, so that homomorphic operations can be performed on them. We define the functional/security requirements of HPRE, and then propose a specific construction supporting the group operation (over the target group in bilinear groups) based on the PRE scheme by Libert and Vergnaud (PKC 2008) and the CCA secure public key encryption scheme by Lai et al. (CT-RSA 2010), and prove its security in the standard model. Additionally, we show two extensions of our HPRE scheme for the group operation: an HPRE scheme for addition and an HPRE scheme for degree-2 polynomials (in which the number of degree-2 terms is constant), by using the technique of the recent work by Catalano and Fiore (ACMCCS 2015).
引用
收藏
页码:81 / 98
页数:18
相关论文
共 50 条
  • [1] Encrypted data processing with Homomorphic Re-Encryption
    Ding, Wenxiu
    Yan, Zheng
    Deng, Robert H.
    INFORMATION SCIENCES, 2017, 409 : 35 - 55
  • [2] A Homomorphic Proxy Re-encryption from Lattices
    Ma, Chunguang
    Li, Juyan
    Ouyang, Weiping
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 353 - 372
  • [3] Homomorphic Proxy Re-Encryption and Multiparty Cloud Computing
    Liu, Shu-Guang
    Zhang, Wei
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 222 - 225
  • [4] A BGN-Type Homomorphic Proxy Re-Encryption Scheme
    Liu, Shu-Guang
    Zhang, Wei
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 226 - 229
  • [5] Multi-key Homomorphic Proxy Re-Encryption
    Yasuda, Satoshi
    Koseki, Yoshihiro
    Hiromasa, Ryo
    Kawai, Yutaka
    INFORMATION SECURITY (ISC 2018), 2018, 11060 : 328 - 346
  • [6] Distributed Proxy Re-Encryption Protocol for Secure Multiparty Computation with Fully Homomorphic Encryption
    Demir, Busranur Bulbul
    Altilar, Deniz Turgay
    2024 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING, BLACKSEACOM 2024, 2024, : 199 - 204
  • [7] Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts
    Paul, Arinjita
    Selvi, S. Sharmila Deva
    Rangan, C. Pandu
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 644 - 665
  • [8] Efficient Unidirectional Proxy Re-Encryption
    Chow, Sherman S. M.
    Weng, Jian
    Yang, Yanjiang
    Deng, Robert H.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 316 - +
  • [9] Combined Proxy Re-encryption
    Canard, Sebastien
    Devigne, Julien
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 49 - 66
  • [10] Anonymous proxy re-encryption
    Shao, Jun
    Liu, Peng
    Wei, Guiyi
    Ling, Yun
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 439 - 449