Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts

被引:7
|
作者
Kawai, Yutaka [1 ]
Matsuda, Takahiro [2 ]
Hirano, Takato [1 ]
Koseki, Yoshihiro [1 ]
Hanaoka, Goichiro [2 ]
机构
[1] Mitsubishi Elect, Kamakura, Kanagawa 2478501, Japan
[2] Natl Inst Adv Ind Sci & Technol, Tokyo 1350064, Japan
来源
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES | 2019年 / E102A卷 / 01期
基金
日本科学技术振兴机构;
关键词
Proxy Re-encryption; homomorphic encryption; SIGNATURES; MULTISIGNATURES; SECURITY; SCHEME;
D O I
10.1587/transfun.E102.A.81
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Homomorphic encryption (HE) is useful to analyze encrypted data without decrypting it. However, by using ordinary HE, a user who can decrypt a ciphertext that is generated by executing homomorphic operations, can also decrypt ciphertexts on which homomorphic evaluations have not been performed, since homomorphic operations cannot be executed among ciphertexts which are encrypted under different public keys. To resolve the above problem, we introduce a new cryptographic primitive called Homomorphic Proxy Re-Encryption (HPRE) combining the "key-switching" property of Proxy Re-Encryption (PRE) and the homomorphic property of HE. In our HPRE, original ciphertexts (which have not been re-encrypted) guarantee CCA2 security (and in particular satisfy non-malleability). On the other hand, re-encrypted ciphertexts only guarantee CPA security, so that homomorphic operations can be performed on them. We define the functional/security requirements of HPRE, and then propose a specific construction supporting the group operation (over the target group in bilinear groups) based on the PRE scheme by Libert and Vergnaud (PKC 2008) and the CCA secure public key encryption scheme by Lai et al. (CT-RSA 2010), and prove its security in the standard model. Additionally, we show two extensions of our HPRE scheme for the group operation: an HPRE scheme for addition and an HPRE scheme for degree-2 polynomials (in which the number of degree-2 terms is constant), by using the technique of the recent work by Catalano and Fiore (ACMCCS 2015).
引用
收藏
页码:81 / 98
页数:18
相关论文
共 50 条
  • [41] A Timed-Release Proxy Re-Encryption Scheme
    Emura, Keita
    Miyaji, Atsuko
    Omote, Kazumasa
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (08) : 1682 - 1695
  • [42] Circular Transitivity of a Bidirectional Proxy Re-encryption Scheme
    Hong, Xiaojing
    Wang, Bin
    MECHATRONICS AND INDUSTRIAL INFORMATICS, PTS 1-4, 2013, 321-324 : 2639 - +
  • [43] Secure Proxy Re-Encryption from CBE to IBE
    CHEN Yan
    Wuhan University Journal of Natural Sciences, 2008, (06) : 657 - 661
  • [44] Revocable attribute-based proxy re-encryption
    Luo, Fucai
    Al-Kuwari, Saif
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) : 465 - 482
  • [45] Fast Proxy Re-Encryption for Publish/Subscribe Systems
    Polyakov, Yuriy
    Rohloff, Kurt
    Sahu, Gyana
    Vaikuntanathan, Vinod
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2017, 20 (04)
  • [46] Efficient proxy re-encryption with keyword search scheme
    Guo, Lifeng
    Lu, Bo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (06): : 1221 - 1228
  • [47] Proxy Re-Encryption Scheme for Decentralized Storage Networks
    Kan, Jia
    Zhang, Jie
    Liu, Dawei
    Huang, Xin
    APPLIED SCIENCES-BASEL, 2022, 12 (09):
  • [48] A proxy broadcast re-encryption for cloud data sharing
    Sun, Maosheng
    Ge, Chunpeng
    Fang, Liming
    Wang, Jiandong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 10455 - 10469
  • [49] Multi-use Unidirectional Proxy Re-Encryption
    Shao, Jun
    Liu, Peng
    Cao, Zhenfu
    Wei, Guiyi
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [50] Threshold Proxy Re-encryption and Its Application in Blockchain
    Chen, Xi
    Liu, Yun
    Li, Yong
    Lin, Changlu
    CLOUD COMPUTING AND SECURITY, PT IV, 2018, 11066 : 16 - 25