Strong Post-Compromise Secure Proxy Re-Encryption

被引:11
|
作者
Davidson, Alex [1 ,2 ]
Deo, Amit [1 ]
Lee, Ela [1 ]
Martin, Keith [1 ]
机构
[1] Royal Holloway Univ London, ISG, Egham, Surrey, England
[2] Cloudflare, London, England
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.1007/978-3-030-21548-4_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy Re-Encryption (PRE) allows a ciphertext encrypted using a key pk(i) to be re-encrypted by a third party so that it is an encryption of the same message under a new key pk(j), without revealing the message. We define Post-Compromise Security (PCS) in the context of PRE. This ensures that an adversary cannot distinguish which of two adversarially chosen ciphertexts a re-encryption was created from even when given the old secret key and the update token used to perform the re-encryption. We give separating examples demonstrating how PCS is stronger than existing security definitions for PRE achieving similar goals, before showing that PCS can be achieved using a combination of existing security properties from the literature. In doing so, we show there are existing PRE schemes satisfying PCS. Finally, we give a construction demonstrating that natural modifications of practical PRE schemes provably have PCS directly, without incurring overheads from the security reductions we have shown, and from weaker assumptions than existing schemes.
引用
收藏
页码:58 / 77
页数:20
相关论文
共 50 条
  • [21] Anonymous proxy re-encryption
    Shao, Jun
    Liu, Peng
    Wei, Guiyi
    Ling, Yun
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 439 - 449
  • [22] Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme
    Khan, Muhammad Nauman
    Rao, Asha
    Camtepe, Seyit
    Pieprzyk, Josef
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 85 - 98
  • [23] A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    IEEE ACCESS, 2018, 6 : 70017 - 70024
  • [24] Improved Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
    Zhao Guoan
    Fang Liming
    Wang Jiandong
    Ge Chunpeng
    Ren Yongjun
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 476 - +
  • [25] Restricted CCA-secure Bidirectional Proxy Re-encryption Scheme
    Guo, Duntao
    Wang, Xu An
    Zhang, Minqing
    Yang, Xiaoyuan
    PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 678 - 681
  • [26] Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
    Deng, Robert H.
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 1 - +
  • [27] Comments on "Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption"
    Seo, Jae Woo
    Yum, Dae Hyun
    Lee, Pil Joong
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (05) : 3256 - 3256
  • [28] IPRES: In-device Proxy Re-Encryption Service for Secure ICN
    Suksomboon, Kalika
    Tagami, Atsushi
    Basu, Anirban
    Kurihara, Jun
    PROCEEDINGS OF THE 4TH ACM CONFERENCE ON INFORMATION-CENTRIC NETWORKING (ICN 2017), 2017, : 176 - 177
  • [29] Proxy Re-Encryption Based on Homomorphic Encryption
    Bellafqira, Reda
    Coatrieux, Gouenou
    Bouslimi, Dalel
    Quellec, Gwenole
    Cozic, Michel
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161
  • [30] Efficient and Secure MPC Through Integration of FHE and Proxy Re-encryption
    Rohitkumar R. Upadhyay
    Sahadeo Padhye
    SN Computer Science, 6 (2)