A Chosen-Ciphertext Secure Fuzzy Identity-Based Proxy Re-Encryption Scheme

被引:0
|
作者
Ge, Chunpeng [1 ]
Wang, Jiandong [1 ]
Fang, Liming [1 ]
机构
[1] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing 210000, Jiangsu, Peoples R China
基金
中国博士后科学基金; 美国国家科学基金会; 中国国家自然科学基金;
关键词
Proxy re-encryption; Identity-based proxy re-encryption; Fuzzy identity-based proxy re-encryption; Chosen-ciphertext security;
D O I
10.14257/ijsia.2016.10.5.33
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Green and Ateniese introduced the notion of identity-based proxy re-encryption (IB-PRE), whereby the proxy can covert a ciphertext encrypted under the delegator's identity to an encryption under the delegatee's identity of the same message. In some situations, biometric, such as dactylogram, was used as identities. However, these biometric identities will inherently have some noise when they are sampled each time. To make identity-based proxy re-encryption flexible on identities, we introduced a new primitive called fuzzy identity-based proxy re-encryption (FIB-PRE), in which an identity is viewed as a set of descriptive attributes. In a fuzzy identity-based proxy re-encryption scheme, an identity can decrypt a ciphertext re-encrypted under another identity, if and only if and are close to each other as measured by the "set overlap" distance metric. In this work, we first formulate the security model of a FIB-PRE scheme. Finally, we present a construction of FIB-PRE and prove its CCA security under the decisional bilinear Diffie-Hellman (DBDH) assumption in the random model.
引用
收藏
页码:347 / 360
页数:14
相关论文
共 50 条
  • [41] A CCA-secure Multi-use Identity-based Proxy Re-encryption Scheme
    Cai, Yi
    Liu, Xudong
    [J]. 2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND COMMUNICATIONS (SCAC), 2014, : 51 - 56
  • [42] Identity-based Conditional Proxy Re-encryption
    Shao, Jun
    Wei, Guiyi
    Ling, Yun
    Xie, Mande
    [J]. 2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [43] A provably secure collusion-resistant identity-based proxy re-encryption scheme based on NTRU
    Yang, Nan
    Tian, Youliang
    Zhou, Zhou
    Zhang, Qijia
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2023, 78
  • [44] On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption
    Wan, Zhong-Mei
    Weng, Jian
    Lai, Xue-Jia
    Liu, Sheng-Li
    Li, Ji-Guo
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (01) : 243 - 259
  • [45] Identity-based encryption with leakage-amplified chosen-ciphertext attacks security
    Zhou, Yanwei
    Yang, Bo
    Xia, Zhe
    Zhang, Mingwu
    Mu, Yi
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 809 : 277 - 295
  • [46] Chosen-Ciphertext Secure Multi-authority Fuzzy Identity-Based Key Encapsulation without ROM
    Fang, Liming
    Wang, Jiandong
    Ren, Yongjun
    Xia, Jinyue
    Bian, Shizhu
    [J]. 2008 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, VOLS 1 AND 2, PROCEEDINGS, 2008, : 326 - 330
  • [47] Chosen ciphertext secure identity-based broadcast encryption in the standard model
    Sun J.
    Hu Y.-P.
    Zhang L.-Y.
    [J]. Journal of Shanghai Jiaotong University (Science), 2011, 16 (06) : 672 - 676
  • [48] Chosen Ciphertext Secure Identity-Based Broadcast Encryption in the Standard Model
    孙瑾
    胡予濮
    张乐友
    [J]. Journal of Shanghai Jiaotong University(Science), 2011, 16 (06) : 672 - 676
  • [49] Identity-based re-encryption scheme with lightweight re-encryption key generation
    Liu, Liang
    Ye, Jun
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2018, 21 (01): : 41 - 57
  • [50] Further improvement of a dynamic type and identity-based proxy re-encryption scheme
    [J]. 1600, Univ. of Electronic Science and Technology of China (45):