Strong Post-Compromise Secure Proxy Re-Encryption

被引:11
|
作者
Davidson, Alex [1 ,2 ]
Deo, Amit [1 ]
Lee, Ela [1 ]
Martin, Keith [1 ]
机构
[1] Royal Holloway Univ London, ISG, Egham, Surrey, England
[2] Cloudflare, London, England
基金
英国工程与自然科学研究理事会;
关键词
D O I
10.1007/978-3-030-21548-4_4
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Proxy Re-Encryption (PRE) allows a ciphertext encrypted using a key pk(i) to be re-encrypted by a third party so that it is an encryption of the same message under a new key pk(j), without revealing the message. We define Post-Compromise Security (PCS) in the context of PRE. This ensures that an adversary cannot distinguish which of two adversarially chosen ciphertexts a re-encryption was created from even when given the old secret key and the update token used to perform the re-encryption. We give separating examples demonstrating how PCS is stronger than existing security definitions for PRE achieving similar goals, before showing that PCS can be achieved using a combination of existing security properties from the literature. In doing so, we show there are existing PRE schemes satisfying PCS. Finally, we give a construction demonstrating that natural modifications of practical PRE schemes provably have PCS directly, without incurring overheads from the security reductions we have shown, and from weaker assumptions than existing schemes.
引用
收藏
页码:58 / 77
页数:20
相关论文
共 50 条
  • [41] Hierarchical conditional proxy re-encryption
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 380 - 389
  • [42] Fuzzy conditional proxy re-encryption
    FANG LiMing
    WANG JianDong
    GE ChunPeng
    REN YongJun
    ScienceChina(InformationSciences), 2013, 56 (05) : 211 - 223
  • [43] Proxy re-encryption with keyword search
    Shao, Jun
    Cao, Zhenfu
    Liang, Xiaohui
    Lin, Huang
    INFORMATION SCIENCES, 2010, 180 (13) : 2576 - 2587
  • [44] Conditional Proxy Broadcast Re-Encryption
    Chu, Cheng-Kang
    Weng, Jian
    Chow, Sherman S. M.
    Zhou, Jianying
    Deng, Robert H.
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 327 - +
  • [45] Fine-grained and heterogeneous proxy re-encryption for secure cloud storage
    Xu, Peng
    Chen, Hongwu
    Zou, Deqing
    Jin, Hai
    CHINESE SCIENCE BULLETIN, 2014, 59 (32): : 4201 - 4209
  • [46] On the security model for proxy re-encryption
    Wang, Xu'an
    Yang, Xiaoyuan
    Zhang, Minqing
    Du, Xiaoni
    Journal of Information and Computational Science, 2010, 7 (09): : 1951 - 1958
  • [47] Fuzzy conditional proxy re-encryption
    LiMing Fang
    JianDong Wang
    ChunPeng Ge
    YongJun Ren
    Science China Information Sciences, 2013, 56 : 1 - 13
  • [48] CCA secure and efficient proxy re-encryption scheme without bilinear pairing
    Prasad, Shilpee
    Purushothama, B. R.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
  • [49] Proxy Re-Encryption for Secure Data Sharing with Blockchain in Internet of Medical Things
    Pei, Hongmei
    Yang, Peng
    Li, Weihao
    Du, Miao
    Hu, Zhongjian
    COMPUTER NETWORKS, 2024, 245
  • [50] Secure Content Distribution Using Multi-hop Proxy Re-encryption
    Han-Yu Lin
    Wireless Personal Communications, 2015, 82 : 1449 - 1459