Anonymous proxy re-encryption

被引:22
|
作者
Shao, Jun [1 ]
Liu, Peng [2 ]
Wei, Guiyi [1 ]
Ling, Yun [1 ]
机构
[1] Zhejiang Gongshang Univ, Coll Comp & Informat Engn, Hangzhou 310018, Zhejiang, Peoples R China
[2] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16801 USA
基金
美国国家科学基金会;
关键词
proxy re-encryption; chosen-ciphertext security; collusion resistance; anonymity; random oracle model; PUBLIC-KEY CRYPTOSYSTEM; SECURE;
D O I
10.1002/sec.326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy re-encryption (PRE) is a public key encryption that allows a semi-trusted proxy with some information (a.k.a., re-encryption key) to transform a ciphertext under one public key into another ciphertext under another public key. Because of this special property, PRE has many applications, such as the distributed file system. Some of these applications demand that the underlying PRE scheme is anonymous under chosen-ciphertext attacks (CCAs); that is, the adversary cannot identify the recipient of the original/transformed ciphertext, even if it knows the PRE key and can launch the CCA. However, to the best of our knowledge, none of the existing PRE schemes satisfy this requirement. In this work, we propose the first anonymous PRE with CCA security and collusion resistance. Our proposal is proved in the random oracle model based on the DDH assumption. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:439 / 449
页数:11
相关论文
共 50 条
  • [21] Lattice-based unidirectional Proxy Re-Encryption and Proxy Re-Encryption+ schemes
    Singh, Kunwar
    Rangan, C. Pandu
    Sheshank, Samir
    Agrawal, Richa
    IET INFORMATION SECURITY, 2021, 15 (01) : 1 - 12
  • [22] Proxy re-encryption via indistinguishability obfuscation
    Ohata, Satsuya
    Matsuura, Kanta
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1786 - 1795
  • [23] Efficient and Secure Certificateless Proxy Re-Encryption
    Liu, Ya
    Wang, Hongbing
    Wang, Chunlu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04): : 2254 - 2275
  • [24] Proxy re-encryption enabled secure and anonymous IoT data sharing platform based on blockchain
    Manzoor, Ahsan
    Braeken, An
    Kanhere, Salil S.
    Ylianttila, Mika
    Liyanage, Madhsanka
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2021, 176
  • [25] EFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
    Wei, Guiyi
    Lu, Rongxing
    Shao, Jun
    JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 2014, 80 (08) : 1549 - 1562
  • [26] Non-transferable Proxy Re-encryption
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    COMPUTER JOURNAL, 2019, 62 (04): : 490 - 506
  • [27] Improved Proxy Re-Encryption With Delegatable Verifiability
    Zhan, Yu
    Wang, Baocang
    Wang, Zheng
    Pei, Tao
    Chen, Yuan
    Qu, Quanbo
    Zhang, Zhili
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 592 - 602
  • [28] An efficient heterogeneous online/offline anonymous certificateless signcryption with proxy re-encryption for Internet of Vehicles
    Hundera, Negalign Wake
    Aftab, Muhammad Umar
    Mesfin, Dagmawit
    Dioubi, Fatene
    Xu, Huiying
    Zhu, Xinzhong
    VEHICULAR COMMUNICATIONS, 2024, 49
  • [29] Realizing Proxy Re-encryption in the Symmetric World
    Syalim, Amril
    Nishide, Takashi
    Sakurai, Kouichi
    INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 259 - 274
  • [30] Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 564 - 575