Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search

被引:47
|
作者
Fang, Liming [2 ]
Susilo, Willy [1 ]
Ge, Chunpeng [2 ]
Wang, Jiandong [2 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
关键词
Public key encryption; Conditional proxy re-encryption; Keyword search; Anonymity; Chosen-ciphertext security; PUBLIC-KEY ENCRYPTION; GUESSING ATTACKS; RANDOM ORACLES; SCHEMES;
D O I
10.1016/j.tcs.2012.08.017
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Weng et al. introduced the notion of conditional proxy re-encryption (or C-PRE, for short), whereby only the ciphertext satisfying one condition set by the delegator can be transformed by the proxy and then decrypted by delegatee. Nonetheless, they left an open problem on how to construct CCA-secure C-PRE schemes with anonymity. Fang et al. answered this question by presenting a construction of anonymous conditional proxy re-encryption (C-PRE) scheme without requiring random oracle. Nevertheless, Fang et al.'s scheme only satisfies the RCCA-security (which is a weaker variant of CCA-security assuming a harmless mauling of the challenge ciphertext is tolerated). Hence, it remains an open problem whether CCA-secure C-PRE schemes that satisfy both anonymity and full CCA-security can really be realized. Shao et al. introduced a new cryptographic primitive, called proxy re-encryption with keyword search (PRES), which is a combination of PRE and public key encryption with keyword search (PEKS), and they left an open problem on how to design an efficient unidirectional PRES scheme. In this paper, we answer the above open problems by proposing a new cryptographic primitive called conditional proxy re-encryption with keyword search (C-PRES), which combines C-PRE and PEKS. We note that there are subtleties in combining these two notions to achieve a secure scheme, and hence, the combination is not trivial. We propose a definition of security against chosen ciphertext attacks for C-PRES schemes with keyword anonymity, and thereafter present a scheme that satisfies the definition. The performance of our scheme outperforms Weng et al.'s construction, which has been regarded as the most efficient C-PRE scheme to date. (C) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:39 / 58
页数:20
相关论文
共 50 条
  • [1] Chosen-Ciphertext Secure Proxy Re-Encryption
    Canetti, Ran
    Hohenberger, Susan
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 185 - 194
  • [2] Unidirectional chosen-ciphertext secure proxy re-encryption
    Libert, Benoit
    Vergnaud, Damien
    PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 360 - +
  • [3] Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
    Sur, Chul
    Jung, Chae Duk
    Park, Youngho
    Rhee, Kyung Hyune
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2010, 6109 : 214 - +
  • [4] Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
    Libert, Benoit
    Vergnaud, Damien
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (03) : 1786 - 1802
  • [5] Chosen-Ciphertext Secure Homomorphic Proxy Re-Encryption
    Luo, Fucai
    Al-Kuwari, Saif
    Susilo, Willy
    Duong, Dung Hoang
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (04) : 2398 - 2408
  • [6] Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
    Weng, Jian
    Yang, Yanjiang
    Tang, Qiang
    Deng, Robert H.
    Bao, Feng
    INFORMATION SECURITY, PROCEEDINGS, 2009, 5735 : 151 - +
  • [7] Improved Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
    Zhao Guoan
    Fang Liming
    Wang Jiandong
    Ge Chunpeng
    Ren Yongjun
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 476 - +
  • [8] Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext Security
    Qiu, JunJie
    Hwang, Gi-Hyun
    Lee, HoonJae
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 104 - 110
  • [9] Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
    Deng, Robert H.
    Weng, Jian
    Liu, Shengli
    Chen, Kefei
    CRYPTOLOGY AND NETWORK SECURITY, 2008, 5339 : 1 - +
  • [10] Comments on "Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption"
    Seo, Jae Woo
    Yum, Dae Hyun
    Lee, Pil Joong
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2013, 59 (05) : 3256 - 3256