Securely Obfuscating Re-Encryption

被引:29
作者
Hohenberger, Susan [1 ]
Rothblum, Guy N. [2 ]
Shelat, Abhi [3 ]
Vaikuntanathan, Vinod [4 ]
机构
[1] Johns Hopkins Univ, Baltimore, MD 21218 USA
[2] Princeton Univ, Princeton, NJ 08544 USA
[3] Univ Virginia, Charlottesville, VA 22903 USA
[4] Microsoft Res Redmond, Redmond, WA 98052 USA
关键词
Obfuscation; Re-encryption;
D O I
10.1007/s00145-010-9077-7
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a positive obfuscation result for a traditional cryptographic functionality. This positive result stands in contrast to well-known impossibility results (Barak et al. in Advances in Cryptology-CRYPTO'01, 2002), for general obfuscation and recent impossibility and implausibility (Goldwasser and Kalai in 46th IEEE Symposium on Foundations of Computer Science (FOCS), pp. 553-562, 2005) results for obfuscation of many cryptographic functionalities. Whereas other positive obfuscation results in the standard model apply to very simple point functions (Canetti in Advances in Cryptology-CRYPTO'97, 1997; Wee in 37th ACM Symposium on Theory of Computing (STOC), pp. 523-532, 2005), our obfuscation result applies to the significantly more complex and widely-used re-encryption functionality. This functionality takes a ciphertext for message m encrypted under Alice's public key and transforms it into a ciphertext for the same message m under Bob's public key. To overcome impossibility results and to make our results meaningful for cryptographic functionalities, our scheme satisfies a definition of obfuscation which incorporates more security-aware provisions.
引用
收藏
页码:694 / 719
页数:26
相关论文
共 20 条
[1]  
[Anonymous], 2006, Report 2006/165
[2]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]  
Barak B., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P1
[4]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[5]  
Blaze M., 1997, ATOMIC PROXY CRYPTOG
[6]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[7]  
Boneh D, 2006, LECT NOTES COMPUT SC, V4004, P573
[8]  
Canetti R., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P131, DOI 10.1145/276698.276721
[9]  
Canetti R, 1997, LECT NOTES COMPUT SC, V1294, P455
[10]  
Dodis Y., 2003, 10 NETW DISTR SYST S