Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security

被引:0
|
作者
Weng, Jian [1 ,2 ]
Yang, Yanjiang [3 ]
Tang, Qiang [4 ]
Deng, Robert H. [1 ]
Bao, Feng [3 ]
机构
[1] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
[2] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Guangdong, Peoples R China
[3] Inst Infocom Res I2R, Singapore 119613, Singapore
[4] Univ Twente, DIES, Fac EEMCS, NL-7500 AE Enschede, Netherlands
来源
关键词
Conditional proxy re-encryption; chosen-ciphertext security; random oracle;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus is more useful in many applications. In this paper, based on a careful observation on the existing definitions and security notions for C-PRE, we re-formalize more rigorous definition and security notions for C-PRE. We further propose a more efficient C-PRE scheme, and prove its chosen-ciphertext security under the decisional bilinear Diffie-Hellman (DBDH) assumption in the random oracle model. In addition, we point out that, a recent C-PRE scheme fails to achieve the chosen-cipher text security.
引用
收藏
页码:151 / +
页数:4
相关论文
共 50 条
  • [21] On Homomorphic Encryption and Chosen-Ciphertext Security
    Hemenway, Brett
    Ostrovsky, Rafail
    PUBLIC KEY CRYPTOGRAPHY - PKC 2012, 2012, 7293 : 52 - 65
  • [22] Chosen-ciphertext security of multiple encryption
    Dodis, Y
    Katz, J
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2005, 3378 : 188 - 209
  • [23] Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
    Liang, Kaitai
    Chu, Cheng-Kang
    Tan, Xiao
    Wong, Duncan S.
    Tang, Chunming
    Zhou, Jianying
    THEORETICAL COMPUTER SCIENCE, 2014, 539 : 87 - 105
  • [24] Conditional Proxy Re-Encryption - A More Efficient Construction
    Vivek, S. Sree
    Selvi, S. Sharmila Deva
    Radhakishan, V.
    Rangan, C. Pandu
    ADVANCES IN NETWORK SECURITY AND APPLICATIONS, 2011, 196 : 502 - +
  • [25] Chosen-ciphertext security from tag-based encryption
    Kiltz, Eike
    THEORY OF CRYPTOGRAPHY, PROCEEDINGS, 2006, 3876 : 581 - 600
  • [26] Chosen-ciphertext security from identity-based encryption
    Canetti, R
    Halevi, S
    Katz, J
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2004, PROCEEDINGS, 2004, 3027 : 207 - 222
  • [27] Fuzzy conditional proxy re-encryption
    Fang LiMing
    Wang JianDong
    Ge ChunPeng
    Ren YongJun
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) : 1 - 13
  • [28] Relaxing chosen-ciphertext security
    Canetti, R
    Krawczyk, H
    Nielsen, JB
    ADVANCES IN CRYPTOLOGY-CRYPTO 2003, PROCEEDINGS, 2003, 2729 : 565 - 582
  • [29] Chosen-ciphertext security from identity-based encryption
    Boneh, Dan
    Canetti, Ran
    Halevi, Shai
    Katz, Jonathan
    SIAM JOURNAL ON COMPUTING, 2006, 36 (05) : 1301 - 1328
  • [30] Hierarchical conditional proxy re-encryption
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 380 - 389