Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts

被引:7
|
作者
Kawai, Yutaka [1 ]
Matsuda, Takahiro [2 ]
Hirano, Takato [1 ]
Koseki, Yoshihiro [1 ]
Hanaoka, Goichiro [2 ]
机构
[1] Mitsubishi Elect, Kamakura, Kanagawa 2478501, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tokyo 1350064, Japan
来源
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | 2019年 / E102A卷 / 01期
基金
日本科学技术振兴机构;
关键词
Proxy Re-encryption; homomorphic encryption; SIGNATURES; MULTISIGNATURES; SECURITY; SCHEME;
D O I
10.1587/transfun.E102.A.81
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Homomorphic encryption (HE) is useful to analyze encrypted data without decrypting it. However, by using ordinary HE, a user who can decrypt a ciphertext that is generated by executing homomorphic operations, can also decrypt ciphertexts on which homomorphic evaluations have not been performed, since homomorphic operations cannot be executed among ciphertexts which are encrypted under different public keys. To resolve the above problem, we introduce a new cryptographic primitive called Homomorphic Proxy Re-Encryption (HPRE) combining the "key-switching" property of Proxy Re-Encryption (PRE) and the homomorphic property of HE. In our HPRE, original ciphertexts (which have not been re-encrypted) guarantee CCA2 security (and in particular satisfy non-malleability). On the other hand, re-encrypted ciphertexts only guarantee CPA security, so that homomorphic operations can be performed on them. We define the functional/security requirements of HPRE, and then propose a specific construction supporting the group operation (over the target group in bilinear groups) based on the PRE scheme by Libert and Vergnaud (PKC 2008) and the CCA secure public key encryption scheme by Lai et al. (CT-RSA 2010), and prove its security in the standard model. Additionally, we show two extensions of our HPRE scheme for the group operation: an HPRE scheme for addition and an HPRE scheme for degree-2 polynomials (in which the number of degree-2 terms is constant), by using the technique of the recent work by Catalano and Fiore (ACMCCS 2015).
引用
收藏
页码:81 / 98
页数:18
相关论文
共 50 条
  • [21] Proxy Impersonation Safe Conditional Proxy Re-Encryption
    Gandhi, Dheeraj
    Rangan, Pandu
    Selvi, Sharmila Deva
    Vivek, Sree
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 33 - 44
  • [22] Proxy Re-Encryption Scheme Supporting a Selection of Delegatees
    Devigne, Julien
    Guerrini, Eleonora
    Laguillaumie, Fabien
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 13 - 30
  • [23] Certificate-Based Conditional Proxy Re-Encryption
    Li, Jiguo
    Zhao, Xuexia
    Zhang, Yichen
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 299 - 310
  • [24] Securing Database Server Using Homomorphic Encryption and Re-encryption
    Greeshma, Sarath
    Jayapriya, R.
    SECURITY IN COMPUTING AND COMMUNICATIONS (SSCC 2015), 2015, 536 : 277 - 289
  • [25] Proxy re-encryption via indistinguishability obfuscation
    Ohata, Satsuya
    Matsuura, Kanta
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1786 - 1795
  • [26] Efficient and Secure Certificateless Proxy Re-Encryption
    Liu, Ya
    Wang, Hongbing
    Wang, Chunlu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04): : 2254 - 2275
  • [27] Dynamic Encrypted Data Sharing Scheme Based on Conditional Proxy Broadcast Re-Encryption for Cloud Storage
    Jiang, Linmei
    Guo, Donghui
    IEEE ACCESS, 2017, 5 : 13336 - 13345
  • [28] Non-transferable Proxy Re-encryption
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    COMPUTER JOURNAL, 2019, 62 (04) : 490 - 506
  • [29] Improved Proxy Re-Encryption With Delegatable Verifiability
    Zhan, Yu
    Wang, Baocang
    Wang, Zheng
    Pei, Tao
    Chen, Yuan
    Qu, Quanbo
    Zhang, Zhili
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 592 - 602
  • [30] A Verifiable proxy re-encryption with keyword search without Random Oracle
    Guo, Lifeng
    Lu, Bo
    Li, Xiangyu
    Xu, He
    2013 9TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2013, : 474 - 478