Anonymous proxy re-encryption

被引:22
|
作者
Shao, Jun [1 ]
Liu, Peng [2 ]
Wei, Guiyi [1 ]
Ling, Yun [1 ]
机构
[1] Zhejiang Gongshang Univ, Coll Comp & Informat Engn, Hangzhou 310018, Zhejiang, Peoples R China
[2] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16801 USA
基金
美国国家科学基金会;
关键词
proxy re-encryption; chosen-ciphertext security; collusion resistance; anonymity; random oracle model; PUBLIC-KEY CRYPTOSYSTEM; SECURE;
D O I
10.1002/sec.326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy re-encryption (PRE) is a public key encryption that allows a semi-trusted proxy with some information (a.k.a., re-encryption key) to transform a ciphertext under one public key into another ciphertext under another public key. Because of this special property, PRE has many applications, such as the distributed file system. Some of these applications demand that the underlying PRE scheme is anonymous under chosen-ciphertext attacks (CCAs); that is, the adversary cannot identify the recipient of the original/transformed ciphertext, even if it knows the PRE key and can launch the CCA. However, to the best of our knowledge, none of the existing PRE schemes satisfy this requirement. In this work, we propose the first anonymous PRE with CCA security and collusion resistance. Our proposal is proved in the random oracle model based on the DDH assumption. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:439 / 449
页数:11
相关论文
共 50 条
  • [31] A Homomorphic Proxy Re-encryption from Lattices
    Ma, Chunguang
    Li, Juyan
    Ouyang, Weiping
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 353 - 372
  • [32] Identity-based proxy re-encryption
    Green, Matthew
    Ateniese, Giuseppe
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 288 - +
  • [33] Proxy re-encryption systems for identity-based encryption
    Matsuo, Toshihiko
    Pairing-Based Cryptography - Pairing 2007, 2007, 4575 : 247 - 267
  • [34] Unidirectional Updatable Encryption and Proxy Re-encryption from DDH
    Miao, Peihan
    Patranabis, Sikhar
    Watson, Gaven
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT II, 2023, 13941 : 368 - 398
  • [35] Certificateless Proxy Re-Encryption Without Pairings
    Yang, Kang
    Xu, Jing
    Zhang, Zhenfeng
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 67 - 88
  • [36] On quorum controlled asymmetric proxy re-encryption
    Jakobsson, M
    PUBLIC KEY CRYPTOGRAPHY, 1999, 1560 : 112 - 121
  • [37] Threshold- Based Pairing-free Conditional Anonymous Proxy Re-Encryption Scheme
    Li Zhaobin
    Zhao Hong
    Wei Zhanzhen
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2021, 43 (11) : 3350 - 3358
  • [38] Key-Private Proxy Re-encryption
    Ateniese, Giuseppe
    Benson, Karyn
    Hohenberger, Susan
    TOPICS IN CRYPTOLOGY - CT-RSA 2009, PROCEEDINGS, 2009, 5473 : 279 - 294
  • [39] Proxy Re-Encryption and Re-Signatures from Lattices
    Fan, Xiong
    Liu, Feng-Hao
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 363 - 382
  • [40] Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
    Wang, Xiaolei
    Wang, Yang
    Wang, Mingqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 535 - 544