Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security

被引:0
|
作者
Weng, Jian [1 ,2 ]
Yang, Yanjiang [3 ]
Tang, Qiang [4 ]
Deng, Robert H. [1 ]
Bao, Feng [3 ]
机构
[1] Singapore Management Univ, Sch Informat Syst, Singapore 178902, Singapore
[2] Jinan Univ, Dept Comp Sci, Guangzhou 510632, Guangdong, Peoples R China
[3] Inst Infocom Res I2R, Singapore 119613, Singapore
[4] Univ Twente, DIES, Fac EEMCS, NL-7500 AE Enschede, Netherlands
来源
关键词
Conditional proxy re-encryption; chosen-ciphertext security; random oracle;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Recently, a variant of proxy re-encryption, named conditional proxy re-encryption (C-PRE), has been introduced. Compared with traditional proxy re-encryption, C-PRE enables the delegator to implement fine-grained delegation of decryption rights, and thus is more useful in many applications. In this paper, based on a careful observation on the existing definitions and security notions for C-PRE, we re-formalize more rigorous definition and security notions for C-PRE. We further propose a more efficient C-PRE scheme, and prove its chosen-ciphertext security under the decisional bilinear Diffie-Hellman (DBDH) assumption in the random oracle model. In addition, we point out that, a recent C-PRE scheme fails to achieve the chosen-cipher text security.
引用
收藏
页码:151 / +
页数:4
相关论文
共 50 条
  • [31] Fuzzy conditional proxy re-encryption
    FANG LiMing
    WANG JianDong
    GE ChunPeng
    REN YongJun
    ScienceChina(InformationSciences), 2013, 56 (05) : 211 - 223
  • [32] Conditional Proxy Broadcast Re-Encryption
    Chu, Cheng-Kang
    Weng, Jian
    Chow, Sherman S. M.
    Zhou, Jianying
    Deng, Robert H.
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 327 - +
  • [33] Fuzzy conditional proxy re-encryption
    LiMing Fang
    JianDong Wang
    ChunPeng Ge
    YongJun Ren
    Science China Information Sciences, 2013, 56 : 1 - 13
  • [34] Combiners for Chosen-Ciphertext Security
    Zhang, Cong
    Cash, David
    Wang, Xiuhua
    Yu, Xiaoqi
    Chow, Sherman S. M.
    COMPUTING AND COMBINATORICS, COCOON 2016, 2016, 9797 : 257 - 268
  • [35] Amplification of Chosen-Ciphertext Security
    Lin, Huijia
    Tessaro, Stefano
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2013, 2013, 7881 : 503 - 519
  • [36] Group-based proxy re-encryption scheme secure against chosen ciphertext attack
    Ma, Chunbo
    Ao, Jun
    International Journal of Network Security, 2009, 8 (03) : 266 - 270
  • [37] Proxy Impersonation Safe Conditional Proxy Re-Encryption
    Gandhi, Dheeraj
    Rangan, Pandu
    Selvi, Sharmila Deva
    Vivek, Sree
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, : 33 - 44
  • [38] Anonymous Identity-Based Broadcast Encryption with Chosen-Ciphertext Security
    He, Kai
    Weng, Jian
    Liu, Jia-Nan
    Liu, Joseph K.
    Liu, Wei
    Deng, Robert H.
    ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 247 - 255
  • [39] On the security model for proxy re-encryption
    Wang, Xu'an
    Yang, Xiaoyuan
    Zhang, Minqing
    Du, Xiaoni
    Journal of Information and Computational Science, 2010, 7 (09): : 1951 - 1958
  • [40] Efficient Chosen-Ciphertext Secure Encryption from R-LWE
    Wang, Ting
    Han, Guoqiang
    Yu, Jianping
    Zhang, Peng
    Sun, Xiaoqiang
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) : 2973 - 2988