Puncturable Proxy Re-Encryption Supporting to Group Messaging Service

被引:15
作者
Tran Viet Xuan Phuong [1 ,2 ]
Susilo, Willy [1 ]
Kim, Jongkil [1 ]
Yang, Guomin [1 ]
Liu, Dongxi [2 ]
机构
[1] Univ Wollongong, Inst Cybersecur & Cryptol, Sch Comp & Informat Technol, Wollongong, NSW, Australia
[2] CSIRO, Data61, Syndey, Australia
来源
COMPUTER SECURITY - ESORICS 2019, PT I | 2019年 / 11735卷
关键词
Puncturable encryption; Proxy Re-Encryption; Group messaging service; CCA security;
D O I
10.1007/978-3-030-29959-0_11
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This work envisions a new encryption primitive for many-to-many paradigms such as group messaging systems. Previously, puncturable encryption (PE) was introduced to provide forward security for asynchronous messaging services. However, existing PE schemes were proposed only for one-to-one communication, and causes a significant overhead for a group messaging system. In fact, the group communication over PE can only be achieved by encrypting a message multiple times for each receiver by the sender's device, which is usually suitable to restricted resources such as mobile phones or sensor devices. Our new suggested scheme enables to re-encrypt ciphertexts of puncturable encryption by a message server (i.e., a proxy) so that computationally heavy operations are delegated to the server who has more powerful processors and a constant power source. We then proposed a new Puncturable Proxy Re-Encryption (PPRE) scheme. The scheme is inspired by unidirectional proxy re-encryption (UPRE), which achieves forward secrecy through fine-grained revocation of decryption capability by integrating the PE scheme. This paper first presents a forward secure PPRE in the group messaging service. Our scheme is IND-CCA secure under 3-weak Decision Bilinear Diffie-Hellman Inversion assumption.
引用
收藏
页码:215 / 233
页数:19
相关论文
共 24 条
  • [1] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
  • [2] Ateniese G., 2015, NDSS
  • [3] Ateniese G, 2009, LECT NOTES COMPUT SC, V5473, P279, DOI 10.1007/978-3-642-00862-7_19
  • [4] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
  • [5] Two Secure Anonymous Proxy-based Data Storages
    Blazy, Olivier
    Bultel, Xavier
    Lafourcade, Pascal
    [J]. SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, : 251 - 258
  • [6] Efficient Selective Identity-Based Encryption Without Random Oracles
    Boneh, Dan
    Boyen, Xavier
    [J]. JOURNAL OF CRYPTOLOGY, 2011, 24 (04) : 659 - 693
  • [7] Chosen-ciphertext security from identity-based encryption
    Canetti, R
    Halevi, S
    Katz, J
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222
  • [8] Canetti R, 2003, LECT NOTES COMPUT SC, V2656, P255
  • [9] Canetti R., 2007, P 14 ACM CCS
  • [10] Chu CK, 2007, LECT NOTES COMPUT SC, V4779, P189