Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption

被引:53
|
作者
Shao, Jun [2 ]
Cao, Zhenfu [1 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai, Peoples R China
[2] Zhejiang Gongshang Univ, Sch Comp & Informat Engn, Hangzhou, Zhejiang, Peoples R China
关键词
ID-based proxy re-encryption; Multi-usability; Unidirectionality; Chosen ciphertext security; Collusion resistance; SECURE; SCHEMES;
D O I
10.1016/j.ins.2012.04.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
At ACNS 2007, Ateniese and Green proposed the concept of ID-based proxy re-encryption (IBPRE), where a semi-trusted proxy with some information (a.k.a. re-encryption key), can transform a ciphertext under an identity to another ciphertext under another identity with the same plaintext. However, the proxy cannot obtain the plaintext. Recently. Wang et al. revisited this primitive by allowing the chosen ciphertext attack when the ciphertext could be transformed several times. They also proposed a concrete multi-use unidirectional ID-based proxy re-encryption (MUIBPRE) scheme, which is proven secure in the random oracle. Nonetheless, they left the problem of constructing a multi-use unidirectional IBPRE scheme in the standard model. What is worse, their scheme cannot resist the collusion attack, which is an important security requirement for unidirectional proxy re-encryption. To solve this problem, in this paper we present a conversion from non-anonymous hierarchical identity-based encryption (NaHIBE) with strongly CPA security to CCA-secure and collusion-resistant MUIBPRE. Furthermore, based on the NaHIBE scheme proposed by Waters at Crypto'09, we give the first CCA-secure and collusion-resistant MUIBPRE scheme in the standard model. (C) 2012 Elsevier Inc. All rights reserved.
引用
收藏
页码:83 / 95
页数:13
相关论文
共 50 条
  • [1] Multi-use and unidirectional identity-based proxy re-encryption schemes
    Wang, Hongbing
    Cao, Zhenfu
    Wang, Licheng
    INFORMATION SCIENCES, 2010, 180 (20) : 4042 - 4059
  • [2] Identity-based proxy re-encryption
    Green, Matthew
    Ateniese, Giuseppe
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 288 - +
  • [3] On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption
    Wan, Zhong-Mei
    Weng, Jian
    Lai, Xue-Jia
    Liu, Sheng-Li
    Li, Ji-Guo
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (01) : 243 - 259
  • [4] Proxy re-encryption systems for identity-based encryption
    Matsuo, Toshihiko
    Pairing-Based Cryptography - Pairing 2007, 2007, 4575 : 247 - 267
  • [5] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    Lai, Jun-Zuo
    Zhu, Wen-Tao
    Deng, Robert H.
    Liu, Sheng-Li
    Kou, Wei-Dong
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (04) : 793 - 806
  • [6] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    Jun-Zuo Lai
    Wen-Tao Zhu
    Robert H. Deng
    Sheng-Li Liu
    Wei-Dong Kou
    Journal of Computer Science and Technology, 2010, 25 : 793 - 806
  • [7] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    赖俊祚
    朱文涛
    邓慧杰
    刘胜利
    寇卫东
    JournalofComputerScience&Technology, 2010, 25 (04) : 793 - 806
  • [8] A CCA-secure Multi-use Identity-based Proxy Re-encryption Scheme
    Cai, Yi
    Liu, Xudong
    2014 IEEE SYMPOSIUM ON COMPUTER APPLICATIONS AND COMMUNICATIONS (SCAC), 2014, : 51 - 56
  • [9] Identity-Based Conditional Proxy Re-Encryption
    Zhou Dehua
    Chen Kefei
    Liu Shengli
    Zheng Dong
    CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (01): : 61 - 66
  • [10] Identity-based Conditional Proxy Re-encryption
    Shao, Jun
    Wei, Guiyi
    Ling, Yun
    Xie, Mande
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,