DEVELOPMENT ON SECURITY MODELS FOR PROXY RE-ENCRYPTION SCHEMES

被引:0
|
作者
Lo, Mamadou Makhtar [1 ]
Sow, Demba [2 ]
Ben Maaouia, Mohamed [1 ]
机构
[1] UGB, Dept Math Appl, UFR SAT, Dakar, Senegal
[2] UCAD, Dept Math & Informat, FST, Dakar, Senegal
关键词
proxy re-encryption; security models; public keys encryption; access delegation; cryptography;
D O I
10.17654/0972555524001
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
A proxy re-encryption is a type of public key encryption where a proxy is given the ability to transform ciphertext for one user into ciphertext for another user, without having access to either the plaintext or the decryption keys. Proxy re-encryption schemes, since their introduction in 1998 by Blaze et al. [3], are often proposed with specific security notions. We propose here to recall the most commonly used security notions and to propose standard security models for security analysis of proxy reencryption scheme. In this article, we consider the goals of confidentiality and nonmalleability, each in the context of a parametric family of attack models. For each of the resulting pairs of definitions, we prove either an implication or a separation from the other security definitions.
引用
收藏
页码:1 / 21
页数:21
相关论文
共 50 条
  • [1] On the Security of a Conditional Proxy Re-Encryption
    Zhang, Xi
    Chen, Min-Rong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10) : 2644 - 2647
  • [2] On the security model for proxy re-encryption
    Wang, Xu'an
    Yang, Xiaoyuan
    Zhang, Minqing
    Du, Xiaoni
    Journal of Information and Computational Science, 2010, 7 (09): : 1951 - 1958
  • [3] On the security of two identity-based conditional proxy re-encryption schemes
    He, Kai
    Weng, Jian
    Deng, Robert H.
    Liu, Joseph K.
    THEORETICAL COMPUTER SCIENCE, 2016, 652 : 18 - 27
  • [4] Lattice-based unidirectional Proxy Re-Encryption and Proxy Re-Encryption+ schemes
    Singh, Kunwar
    Rangan, C. Pandu
    Sheshank, Samir
    Agrawal, Richa
    IET INFORMATION SECURITY, 2021, 15 (01) : 1 - 12
  • [5] Proxy Re-encryption Schemes for IoT and Crowd Sensing
    Diaz-Sanchez, Daniel
    Sherratt, R. Simon
    Arias, Patricia
    Almenares, Florina
    Lopez, Andres Marin
    2016 IEEE INTERNATIONAL CONFERENCE ON CONSUMER ELECTRONICS (ICCE), 2016,
  • [6] Factoring-Based Proxy Re-Encryption Schemes
    Isshiki, Toshiyuki
    Manh Ha Nguyen
    Tanaka, Keisuke
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 309 - 329
  • [7] Proxy Re-encryption with Unforgeable Re-encryption Keys
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 20 - 33
  • [8] QR Code Security using Proxy Re-Encryption
    Akhil, N., V
    Vijay, Athira
    Kumar, Deepa S.
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [9] IoT device security based on proxy re-encryption
    Kim, SuHyun
    Lee, ImYeong
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2018, 9 (04) : 1267 - 1273
  • [10] IoT device security based on proxy re-encryption
    SuHyun Kim
    ImYeong Lee
    Journal of Ambient Intelligence and Humanized Computing, 2018, 9 : 1267 - 1273