DOI QR코드

DOI QR Code

Efficient and Secure Certificateless Proxy Re-Encryption

  • Liu, Ya (Department of Computer Science and Engineering, University of Shanghai for Science and Technology) ;
  • Wang, Hongbing (Shanghai Key Laboratory of Data Science, Software School, Fudan University) ;
  • Wang, Chunlu (School of Computer Science, Beijing University of Posts and Telecommunications)
  • Received : 2016.09.29
  • Accepted : 2017.02.01
  • Published : 2017.04.30

Abstract

In this paper, we present an IND-CCA2 secure certificateless proxy re-encryption scheme in the random oracle model. A certificateless public key cryptography simplifies the certificate management in a traditional public key infrastructure and the built-in key escrow feature in an identity-based public key cryptography. Our scheme shares the merits of certificateless public key encryption cryptosystems and proxy re-encryption cryptosystems. Our certificateless proxy re-encryption scheme has several practical and useful properties - namely, multi-use, unidirectionality, non-interactivity, non-transitivity and so on. The security of our scheme bases on the standard bilinear Diffie-Hellman and the decisional Bilinear Diffie-Hellman assumptions.

Keywords

References

  1. Matt Blaze, Gerrit Bleumer, Martin Strauss, "Divertible protocols and atomic proxy cryptography," in Proc. of EUROCRYPT 1998, pp. 127-144, May 31- June 4, 1998.
  2. Taher El Gamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Transactions on Information Theory, vol. 31, no. 4, pp. 469-472, 1985. https://doi.org/10.1109/TIT.1985.1057074
  3. Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger, "Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage," in Proc. of NDSS 2005, February 3-4, 2005.
  4. Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger, "Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage," ACM Transaction on Information and System Security, vol. 9, no. 1, pp. 1-30, 2006. https://doi.org/10.1145/1127345.1127346
  5. Ran Canetti, Susan Hohenberger, "Chosen-ciphertext secure proxy re-encryption," in Proc. of ACM Conference on Computer & Communication Security 2007, pp. 185-194, October 29- November 2, 2007.
  6. Giuseppe Ateniese, Karyn Benson and Susan Hohenberger, "Key-Private Proxy Re-encryption," in Proc. of CT-RSA 2009, pp. 279-294, April 20-24, 2009.
  7. Benoit Libert, Damien Vergnaud, "Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption," IEEE Transactions on Information Theory, vol. 57, no. 3, pp. 1786-1802, 2008. https://doi.org/10.1109/TIT.2011.2104470
  8. Peter Gutmann, "PKI: It's Not Dead, Just Resting," IEEE Computer, vol. 35, no. 8, pp. 41-49, 2002.
  9. Adi Shamir, "Identity-Based Cryptosystems and Signature Schemes," in Proc. of CRYPTO 1984, pp. 47-53, August 19-22, 1984.
  10. Matthew Green, Giuseppe Ateniese, "Identity-Based Proxy Re-encryption," in Proc. of ACNS 2007, pp. 288-306, June 5-8, 2007.
  11. S. S. Al-Riyami, K. G. Paterson, "Certificateless Public Key Cryptography," in Proc. of ASIACRYPT 2003, pp. 452-473, November 30 to December 4, 2003.
  12. Dae Hyun Yum, Pil Joong Lee, "Generic Construction of Certificateless Encryption," in Proc. of ICCSA(1) 2004, pp. 802-811, May 14-17, 2004.
  13. Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo, "Certificateless Public Key Encryption Without Pairing," in Proc. of ACM Trans. Inf. Syst. Secur., pp. 134-148, September 20-23, 2005.
  14. Benoit Libert, Jean-Jacques Quisquate, "On Constructing Certificateless Cryptosystems from Identity Based Encryption," in Proc. of PKC 2006, pp. 474-490, April 24-26, 2006.
  15. Jong Hwan Park, Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, "Certificateless Public Key Encryption in the Selective-ID Security Model (Without Random Oracles)," in Proc. of Pairing 2007, 4575, pp. 60-82, July 2-4, 2007.
  16. Yinxia Sun, Futai Zhang, Joonsang Baek, "Strongly Secure Certificateless Public Key Encryption Without Pairing," in Proc. of CANS 2007, pp. 194-208, December 8-10, 2007.
  17. Alexander W. Dent, Benoit Libert, Kenneth G. Paterson, "Certificateless Encryption Schemes Strongly Secure in the Standard Model," in Proc. of PKC 2008, pp. 344-359, March 9-12, 2008.
  18. Hua Guo, Xiyong Zhang, Yi Mu, Zhoujun Li, "An Efficient Certificateless Encryption Scheme in the Standard Model," in Proc. of NSS 2009, pp. 302-309, October 19-21, 2009.
  19. Ario Fiore, Rosario Gennaro, Nigel P. Smart, "Constructing Certificateless Encryption and ID-Based Encryption from ID-Based Key Agreement," in Proc. of Pairing 2010, pp. 167-186, December 13-15, 2010.
  20. S. Sree Vivek, S. Sharmila Deva Selvi, C. Pandu Rangan, "CCA Secure Certificateless Encryption Schemes based on RSA," in Proc. of SECRYPT 2011, pp. 208-217, July 18-21, 2011.
  21. Chul Sur, Chae Duk Jung, Youngho Park, Kyung Hyune Rhee, "Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption," in Proc. of CMS 2010, pp. 214-232, May 31 - June 2, 2010.
  22. Xiaoxin Wu, Lei Xu, Xinwen Zhang, "Poster: a certificateless proxy re-encryption scheme for cloud-based data sharing," in Proc. of CCS 2011, pp. 869-872, October 17-21, 2011.
  23. Lei Xu, Xiaoxin Wu, Xinwen Zhang, "CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud," in Proc. of ASIACCS 2012, pp. 87-88, May 2-4, 2012.
  24. Kaitai Liang, Joseph K. Liu, Duncan S. Wong, Willy Susilo, "An Efficient Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme for Public Clouds Data Sharing," in Proc. of ESORICS 2014, pp. 257-272, September 7-11, 2014.
  25. Peng Xu, Jun Xu, Wei Wang, Hai Jin, Willy Susilo, Deqing Zou, "Generally Hybrid Proxy Re-Encryption: {A} Secure Data Sharing among Cryptographic Clouds," in Proc. of AsiaCCS 2016, pp. 913-918, May 30-June 3, 2016.
  26. Yang Yang, Maode Ma, "Conjunctive Keyword Search With Designated Tester and Timing Enabled Proxy Re-Encryption Function for E-Health Clouds," IEEE transaction on Information Forensics and Security, vol. 11, no. 4, pp. 746-759, 2016. https://doi.org/10.1109/TIFS.2015.2509912
  27. Ran Canetti, Susan Hohenberger, "Chosen-ciphertext secure proxy re-encryption," in Proc. of ACM Conference on Computer & Communication Security 2007, pp. 185-194, October 29- November 2, 2007.
  28. Jee Hea An, Yevgeniy Dodis, Tal Rabin, "On the Security of Joint Signature and Encryption," in Proc. of EUROCRYPT'02, pp. 83-107, April 28- May 2, 2002.
  29. Mihir Bellare, Anand Desai, David Pointcheval, Phillip Rogaway, "Relations Among Notions of Security for Public-Key Encryption Schemes," in Proc. of CRYPTO 1998, pp. 26-45, August 23-27, 1998.
  30. Jean-Sebastien Coron, "On the Exact Security of Full Domain Hash," in Proc. of CRYPTO 2000, pp. 229-235, August 20-24, 2000.