Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts

被引:40
|
作者
Liang, Kaitai [1 ]
Chu, Cheng-Kang [2 ]
Tan, Xiao [1 ]
Wong, Duncan S. [1 ]
Tang, Chunming [3 ]
Zhou, Jianying [2 ]
机构
[1] City Univ Hong Kong, Dept Comp Sci, Kowloon, Hong Kong, Peoples R China
[2] Inst Infocomm Res, Infocomm Secur Dept, Singapore 138632, Singapore
[3] Guangzhou Univ, Sch Math & Informat Sci, Guangzhou 510006, Guangdong, Peoples R China
关键词
Conditional proxy re-encryption; Identity-based proxy re-encryption; Bilinear map; Chosen-ciphertext security; Constant size ciphertext; CRYPTOSYSTEMS; SCHEMES; IBE;
D O I
10.1016/j.tcs.2014.04.027
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Proxy Re-Encryption (PRE) allows one user to delegate the decryption rights of his/her ciphertexts to another user. Since the introduction of Multi-Hop Identity-Based PRE (MH-IBPRE) by Green and Ateniese, the ciphertext size and the decryption complexity grow linearly in the number of re-encryption "hops". In this paper, for the first time, we propose an MH-IBPRE that maintains the (constant) ciphertext size and computational complexity regardless of the number of re-encryption hops. Moreover, our scheme is bidirectional and also supports conditional re-encryption. The scheme is proven secure against selective identity and chosen-ciphertext attacks and collusion resistant in the standard model. As of independent interest, we also show that the conditional re-encryption can also be extended to a set of conditions. (C) 2014 Elsevier B.V. All rights reserved.
引用
收藏
页码:87 / 105
页数:19
相关论文
共 50 条
  • [31] Chosen-ciphertext security from identity-based encryption
    Canetti, R
    Halevi, S
    Katz, J
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222
  • [32] Identity-Based Encryption Secure against Selective Opening Chosen-Ciphertext Attack
    Lai, Junzuo
    Deng, Robert H.
    Liu, Shengli
    Weng, Jian
    Zhao, Yunlei
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 77 - 92
  • [33] Chosen-ciphertext security from identity-based encryption
    Boneh, Dan
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    [J]. SIAM JOURNAL ON COMPUTING, 2006, 36 (05) : 1301 - 1328
  • [34] A Novel Revocable and Identity-Based Conditional Proxy Re-Encryption Scheme With Ciphertext Evolution for Secure Cloud Data Sharing
    Yao, Shimao
    Dayot, Ralph Voltaire J.
    Kim, Hyung-Jin
    Ra, In-Ho
    [J]. IEEE ACCESS, 2021, 9 : 42801 - 42816
  • [35] Secure Content Distribution Using Multi-hop Proxy Re-encryption
    Han-Yu Lin
    [J]. Wireless Personal Communications, 2015, 82 : 1449 - 1459
  • [36] Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
    He, Kai
    Weng, Jian
    Liu, Jia-Nan
    Liu, Joseph K.
    Liu, Wei
    Deng, Robert H.
    [J]. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 247 - 255
  • [37] Efficient dynamic threshold identity-based encryption with constant-size ciphertext
    Susilo, Willy
    Guo, Fuchun
    Mu, Yi
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 609 : 49 - 59
  • [38] Chosen-ciphertext secure hierarchical identity-based encryption from R-LWE
    Jiang, Xue-Feng
    Wang, Ting
    Sun, Zhi-Wei
    [J]. Journal of Computers (Taiwan), 2020, 31 (01) : 320 - 331
  • [39] Secure Content Distribution Using Multi-hop Proxy Re-encryption
    Lin, Han-Yu
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2015, 82 (03) : 1449 - 1459
  • [40] Identity-based proxy re-encryption
    Green, Matthew
    Ateniese, Giuseppe
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 288 - +