Accountable Proxy Re-Encryption for Secure Data Sharing

被引:33
作者
Guo, Hui [1 ]
Zhang, Zhenfeng [2 ]
Xu, Jing [2 ]
An, Ningyu [3 ]
Lan, Xiao [4 ]
机构
[1] State Key Lab Cryptol, POB 5159, Beijing 100878, Peoples R China
[2] Chinese Acad Sci, Inst Software, Trusted Comp & Informat Assurance Lab, Beijing 100190, Peoples R China
[3] Global Energy Interconnect Res Inst Co Ltd, State Grid Corp Joint Lab Artificial Intelligence, Beijing 102209, Peoples R China
[4] Sichuan Univ, Cybersecur Res Inst, Chengdu 610064, Peoples R China
基金
中国国家自然科学基金;
关键词
Proxy re-encryption; cryptography; data security;
D O I
10.1109/TDSC.2018.2877601
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy re-encryption (PRE) provides a promising solution for encrypted data sharing in public cloud. When data owner Alice is going to share her encrypted data with data consumer Bob, Alice generates a re-encryption key and sends it to the cloud server (proxy); by using it, the proxy can transform Alice's ciphertexts into Bob's without learning anything about the underlying plaintexts. Despite that existing PRE schemes can prevent the proxy from recovering Alice's secret key by collusion attacks with Bob, due to the inherent functionality of PRE, it is inevitable that the proxy and Bob together are capable to gain and distribute Alices decryption capabilities. Even worse, the malicious proxy can deny that it has leaked the decryption capabilities and has very little risk of getting caught. To tackle this problem, we introduce the concept of Accountable Proxy Re-Encryption (APRE), whereby if the proxy is accused to abuse the re-encryption key for distributing Alice's decryption capability, a judge algorithm can decide whether it is innocent or not. We then present a non-interactive APRE scheme and prove its CPA security and accountability under DBDH assumption in the standard model. Finally, we show how to extend it to a CCA secure one.
引用
收藏
页码:145 / 159
页数:15
相关论文
共 50 条
[1]  
[Anonymous], 2005, P NETW DISTR SYST SE
[2]  
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]  
Au MH, 2006, LECT NOTES COMPUT SC, V4116, P111
[4]  
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[5]   Two Secure Anonymous Proxy-based Data Storages [J].
Blazy, Olivier ;
Bultel, Xavier ;
Lafourcade, Pascal .
SECRYPT: PROCEEDINGS OF THE 13TH INTERNATIONAL JOINT CONFERENCE ON E-BUSINESS AND TELECOMMUNICATIONS - VOL. 4, 2016, :251-258
[6]  
Boneh D, 2005, LECT NOTES COMPUT SC, V3376, P87
[7]  
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[8]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[9]   Hosting Services on an Untrusted Cloud [J].
Boneh, Dan ;
Gupta, Divya ;
Mironov, Ilya ;
Sahai, Amit .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 :404-436
[10]   PICADOR: End-to-end encrypted Publish-Subscribe information distribution with proxy re-encryption [J].
Borcea, Cristian ;
Gupta, Arnab Deb ;
Polyakov, Yuriy ;
Rohloff, Kurt ;
Ryan, Gerard .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2017, 71 :177-191