Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts

被引:40
|
作者
Liang, Kaitai [1 ]
Chu, Cheng-Kang [2 ]
Tan, Xiao [1 ]
Wong, Duncan S. [1 ]
Tang, Chunming [3 ]
Zhou, Jianying [2 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
[2] Inst Infocomm Res, Infocomm Secur Dept, Singapore 138632, Singapore
[3] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou 510006, Guangdong, Peoples R China
关键词
Conditional proxy re-encryption; Identity-based proxy re-encryption; Bilinear map; Chosen-ciphertext security; Constant size ciphertext; CRYPTOSYSTEMS; SCHEMES; IBE;
D O I
10.1016/j.tcs.2014.04.027
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Proxy Re-Encryption (PRE) allows one user to delegate the decryption rights of his/her ciphertexts to another user. Since the introduction of Multi-Hop Identity-Based PRE (MH-IBPRE) by Green and Ateniese, the ciphertext size and the decryption complexity grow linearly in the number of re-encryption "hops". In this paper, for the first time, we propose an MH-IBPRE that maintains the (constant) ciphertext size and computational complexity regardless of the number of re-encryption hops. Moreover, our scheme is bidirectional and also supports conditional re-encryption. The scheme is proven secure against selective identity and chosen-ciphertext attacks and collusion resistant in the standard model. As of independent interest, we also show that the conditional re-encryption can also be extended to a set of conditions. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:87 / 105
页数:19
相关论文
共 50 条
  • [1] A Chosen-Ciphertext Secure Fuzzy Identity-Based Proxy Re-Encryption Scheme
    Ge, Chunpeng
    Wang, Jiandong
    Fang, Liming
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 347 - 360
  • [2] Chosen-Ciphertext Secure Proxy Re-Encryption
    Canetti, Ran
    Hohenberger, Susan
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 185 - 194
  • [3] Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
    Sur, Chul
    Jung, Chae Duk
    Park, Youngho
    Rhee, Kyung Hyune
    [J]. COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2010, 6109 : 214 - +
  • [4] Unidirectional chosen-ciphertext secure proxy re-encryption
    Libert, Benoit
    Vergnaud, Damien
    [J]. PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 360 - +
  • [5] Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
    Libert, Benoit
    Vergnaud, Damien
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (03) : 1786 - 1802
  • [6] Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption
    Luo, Fucai
    Al-Kuwari, Saif
    Susilo, Willy
    Duong, Dung Hoang
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2398 - 2408
  • [7] Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    [J]. THEORETICAL COMPUTER SCIENCE, 2012, 462 : 39 - 58
  • [8] Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
    Weng, Jian
    Yang, Yanjiang
    Tang, Qiang
    Deng, Robert H.
    Bao, Feng
    [J]. INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 151 - +
  • [9] Improved Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
    Zhao Guoan
    Fang Liming
    Wang Jiandong
    Ge Chunpeng
    Ren Yongjun
    [J]. 2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 476 - +
  • [10] Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext Security
    Qiu, JunJie
    Hwang, Gi-Hyun
    Lee, HoonJae
    [J]. 2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 104 - 110