Anonymous proxy re-encryption

被引:22
|
作者
Shao, Jun [1 ]
Liu, Peng [2 ]
Wei, Guiyi [1 ]
Ling, Yun [1 ]
机构
[1] Zhejiang Gongshang Univ, Coll Comp & Informat Engn, Hangzhou 310018, Zhejiang, Peoples R China
[2] Penn State Univ, Coll Informat Sci & Technol, University Pk, PA 16801 USA
基金
美国国家科学基金会;
关键词
proxy re-encryption; chosen-ciphertext security; collusion resistance; anonymity; random oracle model; PUBLIC-KEY CRYPTOSYSTEM; SECURE;
D O I
10.1002/sec.326
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy re-encryption (PRE) is a public key encryption that allows a semi-trusted proxy with some information (a.k.a., re-encryption key) to transform a ciphertext under one public key into another ciphertext under another public key. Because of this special property, PRE has many applications, such as the distributed file system. Some of these applications demand that the underlying PRE scheme is anonymous under chosen-ciphertext attacks (CCAs); that is, the adversary cannot identify the recipient of the original/transformed ciphertext, even if it knows the PRE key and can launch the CCA. However, to the best of our knowledge, none of the existing PRE schemes satisfy this requirement. In this work, we propose the first anonymous PRE with CCA security and collusion resistance. Our proposal is proved in the random oracle model based on the DDH assumption. Copyright (c) 2011 John Wiley & Sons, Ltd.
引用
收藏
页码:439 / 449
页数:11
相关论文
共 50 条
  • [41] Identity-Based Proxy Re-Encryption Scheme Using Fog Computing and Anonymous Key Generation
    Lin, Han-Yu
    Tsai, Tung-Tso
    Ting, Pei-Yih
    Fan, Yan-Rong
    SENSORS, 2023, 23 (05)
  • [42] Performance Analysis of the Symmetric Proxy Re-encryption Scheme
    Meiliasari, Rizky Putri
    Syalim, Amril
    Yazid, Setiadi
    2019 4TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2019), 2019, : 91 - 96
  • [43] On the Insecurity of an Identity Based Proxy Re-encryption Scheme
    Wang, Xu An
    Yang, Xiaoyuan
    FUNDAMENTA INFORMATICAE, 2010, 98 (2-3) : 277 - 281
  • [44] Proxy Re-encryption Scheme Based on SK Identity Based Encryption
    Wang, Xu An
    Yang, Xiaoyuan
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 657 - 660
  • [45] QR Code Security using Proxy Re-Encryption
    Akhil, N., V
    Vijay, Athira
    Kumar, Deepa S.
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [46] DEVELOPMENT ON SECURITY MODELS FOR PROXY RE-ENCRYPTION SCHEMES
    Lo, Mamadou Makhtar
    Sow, Demba
    Ben Maaouia, Mohamed
    JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2024, 63 (01): : 1 - 21
  • [47] Improved Proxy Re-encryption Scheme with Equality Test
    Yang, Chih-Chen
    Tso, Raylin
    Liu, Zi-Yuan
    Hsu, Jen-Chieh
    Tseng, Yi-Fan
    2021 16TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2021), 2021, : 37 - 44
  • [48] Homomorphic Proxy Re-Encryption and Multiparty Cloud Computing
    Liu, Shu-Guang
    Zhang, Wei
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 222 - 225
  • [49] Accountable Proxy Re-Encryption for Secure Data Sharing
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    Lan, Xiao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 145 - 159
  • [50] A Lattice-based Unidirectional Proxy Re-encryption
    Wang, Lewei
    Jiang, Mingming
    Guo, Yuyan
    Ge, Hui
    International Journal of Network Security, 2024, 26 (04) : 598 - 604