Strong Post-Compromise Secure Proxy Re-Encryption

被引:11
|
作者
Davidson, Alex [1 ,2 ]
Deo, Amit [1 ]
Lee, Ela [1 ]
Martin, Keith [1 ]
机构
[1] Royal Holloway Univ London, ISG, Egham, Surrey, England
[2] Cloudflare, London, England
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.1007/978-3-030-21548-4_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy Re-Encryption (PRE) allows a ciphertext encrypted using a key pk(i) to be re-encrypted by a third party so that it is an encryption of the same message under a new key pk(j), without revealing the message. We define Post-Compromise Security (PCS) in the context of PRE. This ensures that an adversary cannot distinguish which of two adversarially chosen ciphertexts a re-encryption was created from even when given the old secret key and the update token used to perform the re-encryption. We give separating examples demonstrating how PCS is stronger than existing security definitions for PRE achieving similar goals, before showing that PCS can be achieved using a combination of existing security properties from the literature. In doing so, we show there are existing PRE schemes satisfying PCS. Finally, we give a construction demonstrating that natural modifications of practical PRE schemes provably have PCS directly, without incurring overheads from the security reductions we have shown, and from weaker assumptions than existing schemes.
引用
收藏
页码:58 / 77
页数:20
相关论文
共 50 条
  • [1] Efficient and Secure Certificateless Proxy Re-Encryption
    Liu, Ya
    Wang, Hongbing
    Wang, Chunlu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04): : 2254 - 2275
  • [2] Accountable Proxy Re-Encryption for Secure Data Sharing
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    Lan, Xiao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 145 - 159
  • [3] Secure Proxy Re-Encryption from CBE to IBE
    CHEN Yan
    Wuhan University Journal of Natural Sciences, 2008, (06) : 657 - 661
  • [4] Secure Certificateless Proxy Re-encryption Without Pairing
    Kuchta, Veronika
    Sharma, Gaurav
    Sahu, Rajeev Anand
    Bhatia, Tarunpreet
    Markowitch, Olivier
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 2017, 2017, 10418 : 85 - 101
  • [5] Towards a Secure Certificateless Proxy Re-Encryption Scheme
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    Chen, Cheng
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 330 - 346
  • [6] Chosen-Ciphertext Secure Proxy Re-Encryption
    Canetti, Ran
    Hohenberger, Susan
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 185 - 194
  • [7] Updatable Encryption with Post-Compromise Security
    Lehmann, Anja
    Tackmann, Bjorn
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2018, PT III, 2018, 10822 : 685 - 716
  • [8] Proxy Re-encryption with Unforgeable Re-encryption Keys
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    CRYPTOLOGY AND NETWORK SECURITY, CANS 2014, 2014, 8813 : 20 - 33
  • [9] SEMPRE: SECURE MULTICAST ARCHITECTURE USING PROXY RE-ENCRYPTION
    Chiu, Yun-Peng
    Huang, Chun-Ying
    Lei, Chin-Laung
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (7A): : 4719 - 4748
  • [10] Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
    Hanaoka, Goichiro
    Kawai, Yutaka
    Kunihiro, Noboru
    Matsuda, Takahiro
    Weng, Jian
    Zhang, Rui
    Zhao, Yunlei
    TOPICS IN CRYPTOLOGY - CT-RSA 2012, 2012, 7178 : 349 - +