Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search

被引:47
|
作者
Fang, Liming [2 ]
Susilo, Willy [1 ]
Ge, Chunpeng [2 ]
Wang, Jiandong [2 ]
机构
[1] Univ Wollongong, Sch Comp Sci & Software Engn, Ctr Comp & Informat Secur Res, Wollongong, NSW 2522, Australia
[2] Nanjing Univ Aeronaut & Astronaut, Coll Comp Sci & Technol, Nanjing, Jiangsu, Peoples R China
关键词
Public key encryption; Conditional proxy re-encryption; Keyword search; Anonymity; Chosen-ciphertext security; PUBLIC-KEY ENCRYPTION; GUESSING ATTACKS; RANDOM ORACLES; SCHEMES;
D O I
10.1016/j.tcs.2012.08.017
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Weng et al. introduced the notion of conditional proxy re-encryption (or C-PRE, for short), whereby only the ciphertext satisfying one condition set by the delegator can be transformed by the proxy and then decrypted by delegatee. Nonetheless, they left an open problem on how to construct CCA-secure C-PRE schemes with anonymity. Fang et al. answered this question by presenting a construction of anonymous conditional proxy re-encryption (C-PRE) scheme without requiring random oracle. Nevertheless, Fang et al.'s scheme only satisfies the RCCA-security (which is a weaker variant of CCA-security assuming a harmless mauling of the challenge ciphertext is tolerated). Hence, it remains an open problem whether CCA-secure C-PRE schemes that satisfy both anonymity and full CCA-security can really be realized. Shao et al. introduced a new cryptographic primitive, called proxy re-encryption with keyword search (PRES), which is a combination of PRE and public key encryption with keyword search (PEKS), and they left an open problem on how to design an efficient unidirectional PRES scheme. In this paper, we answer the above open problems by proposing a new cryptographic primitive called conditional proxy re-encryption with keyword search (C-PRES), which combines C-PRE and PEKS. We note that there are subtleties in combining these two notions to achieve a secure scheme, and hence, the combination is not trivial. We propose a definition of security against chosen ciphertext attacks for C-PRES schemes with keyword anonymity, and thereafter present a scheme that satisfies the definition. The performance of our scheme outperforms Weng et al.'s construction, which has been regarded as the most efficient C-PRE scheme to date. (C) 2012 Elsevier B.V. All rights reserved.
引用
收藏
页码:39 / 58
页数:20
相关论文
共 50 条
  • [41] Attribute-based Proxy Re-encryption Scheme with Keyword Search
    Liu Zhenhua
    Zhou Peilin
    Duan Shuhong
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (03) : 683 - 689
  • [42] On the Security of a Conditional Proxy Re-Encryption
    Zhang, Xi
    Chen, Min-Rong
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2009, E92A (10) : 2644 - 2647
  • [43] Hierarchical conditional proxy re-encryption
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 380 - 389
  • [44] A New Kind of Conditional Proxy Re-Encryption for Secure Cloud Storage
    Zeng, Peng
    Choo, Kim-Kwang Raymond
    IEEE ACCESS, 2018, 6 : 70017 - 70024
  • [45] Fuzzy conditional proxy re-encryption
    FANG LiMing
    WANG JianDong
    GE ChunPeng
    REN YongJun
    ScienceChina(InformationSciences), 2013, 56 (05) : 211 - 223
  • [46] Conditional Proxy Broadcast Re-Encryption
    Chu, Cheng-Kang
    Weng, Jian
    Chow, Sherman S. M.
    Zhou, Jianying
    Deng, Robert H.
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 327 - +
  • [47] Efficient Chosen-Ciphertext Secure Encryption from R-LWE
    Wang, Ting
    Han, Guoqiang
    Yu, Jianping
    Zhang, Peng
    Sun, Xiaoqiang
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 95 (03) : 2973 - 2988
  • [48] Fuzzy conditional proxy re-encryption
    LiMing Fang
    JianDong Wang
    ChunPeng Ge
    YongJun Ren
    Science China Information Sciences, 2013, 56 : 1 - 13
  • [49] An Authenticated Keyword Searchable Conditional Proxy Re-encryption Scheme in Cloud Services
    Sharma, Sumit
    Swarnakar, Ashutosh
    Babu, Ch Jayanth
    Padmavathy, R.
    Kumar, Rakesh
    PROCEEDINGS OF THE 2020 5TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND SECURITY (ICCCS-2020), 2020,
  • [50] Chosen-ciphertext attack secure public key encryption with auxiliary inputs
    Zhang, Zongyang
    Cao, Zhenfu
    Qian, Haifeng
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (12) : 1404 - 1411