Strong Post-Compromise Secure Proxy Re-Encryption

被引:11
|
作者
Davidson, Alex [1 ,2 ]
Deo, Amit [1 ]
Lee, Ela [1 ]
Martin, Keith [1 ]
机构
[1] Royal Holloway Univ London, ISG, Egham, Surrey, England
[2] Cloudflare, London, England
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.1007/978-3-030-21548-4_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy Re-Encryption (PRE) allows a ciphertext encrypted using a key pk(i) to be re-encrypted by a third party so that it is an encryption of the same message under a new key pk(j), without revealing the message. We define Post-Compromise Security (PCS) in the context of PRE. This ensures that an adversary cannot distinguish which of two adversarially chosen ciphertexts a re-encryption was created from even when given the old secret key and the update token used to perform the re-encryption. We give separating examples demonstrating how PCS is stronger than existing security definitions for PRE achieving similar goals, before showing that PCS can be achieved using a combination of existing security properties from the literature. In doing so, we show there are existing PRE schemes satisfying PCS. Finally, we give a construction demonstrating that natural modifications of practical PRE schemes provably have PCS directly, without incurring overheads from the security reductions we have shown, and from weaker assumptions than existing schemes.
引用
收藏
页码:58 / 77
页数:20
相关论文
共 50 条
  • [31] Secure Data Sharing in the Cloud Through Proxy Re-Encryption Technique
    Adilakshmi, Jyothi
    Rithika, Badgoian
    Pushpalatha, Chitikela
    Venkatesh, Thurpati
    Lohitha, Mandapati
    2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 700 - 705
  • [32] Provably Secure Certificate-based Conditional Proxy Re-encryption
    Li, Jiguo
    Zhao, Xuexia
    Zhang, Yichen
    Yao, Wei
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (04) : 813 - 830
  • [33] Distributed Proxy Re-Encryption Protocol for Secure Multiparty Computation with Fully Homomorphic Encryption
    Demir, Busranur Bulbul
    Altilar, Deniz Turgay
    2024 IEEE INTERNATIONAL BLACK SEA CONFERENCE ON COMMUNICATIONS AND NETWORKING, BLACKSEACOM 2024, 2024, : 199 - 204
  • [34] On the application of generic CCA-secure transformations to proxy re-encryption
    Nunez, David
    Agudo, Isaac
    Lopez, Javier
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1769 - 1785
  • [35] File Matching Based on Secure Authentication and Proxy Homomorphic Re-encryption
    Yu, Bin
    Zhang, Chen
    Li, Weihong
    ICMLC 2019: 2019 11TH INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND COMPUTING, 2019, : 472 - 476
  • [36] Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption
    Hayashi, Ryotaro
    Matsushita, Tatsuyuki
    Yoshida, Takuya
    Fujii, Yoshihiro
    Okada, Koji
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2011, 7038 : 210 - +
  • [37] Fuzzy conditional proxy re-encryption
    Fang LiMing
    Wang JianDong
    Ge ChunPeng
    Ren YongJun
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) : 1 - 13
  • [38] Efficient Unidirectional Proxy Re-Encryption
    Chow, Sherman S. M.
    Weng, Jian
    Yang, Yanjiang
    Deng, Robert H.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 316 - +
  • [39] On the Security of a Conditional Proxy Re-Encryption
    Zhang, Xi
    Chen, Min-Rong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10) : 2644 - 2647
  • [40] Proxy Re-encryption from Lattices
    Kirshanova, Elena
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 77 - 94