Science China Information Sciences

, Volume 53, Issue 3, pp 593–606 | Cite as

CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles

  • Jian Weng
  • MinRong Chen
  • YanJiang Yang
  • Robert Deng
  • KeFei Chen
  • Feng Bao
Research Papers

Abstract

Up to now, it is still an open question of how to construct a chosen-ciphertext secure unidirectional proxy re-encryption scheme in the adaptive corruption model. To address this problem, we propose a new unidirectional proxy re-encryption scheme, and prove its chosen-ciphertext security in the adaptive corruption model without random oracles. Compared with the best known unidirectional proxy re-encryption scheme proposed by Libert and Vergnaud in PKC’08, our scheme enjoys the advantages of both higher efficiency and stronger security.

Keywords

unidirectional proxy re-encryption adaptive corruption model chosen-ciphertext attack 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography. In: Nyberg K, ed. Eurocrypt. Lecture Notes in Computer Science, Vol. 1403. Berlin: Springer-Verlag, 1998. 127–144Google Scholar
  2. 2.
    Ateniese G, Fu K, Green M, et al. Improved proxy re-encryption schemes with applications to secure distributed storage. In: proceedings of NDSS’05, The Internet Society. San Diego, California, USA, 2005Google Scholar
  3. 3.
    Ateniese G, Fu K, Green M, et al. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans Inf Syst Secur, 2006, 9: 1–30CrossRefGoogle Scholar
  4. 4.
    Canetti R, Hohenberger S. Chosen-ciphertext secure proxy re-encryption. In: Ning P, di Vimercati S D C, Syverson P F, eds. ACM Conference on Computer and Communications Security. New York: ACM, 2007. 185–194Google Scholar
  5. 5.
    Libert B, Vergnaud D. Unidirectional chosen-ciphertext secure proxy re-encryption. In: Cramer R, ed. Public Key Cryptography. Lecture Notes in Computer Science, Vol. 4939. Berlin: Springer-Verlag, 2008. 360–379 (full paper available at http://hal.inria.fr/inria-00339530/en)Google Scholar
  6. 6.
    Canetti R, Krawczyk H, Nielsen J B. Relaxing chosenciphertext security. In: Boneh D, ed. CRYPTO. Lecture Notes in Computer Science, Vol. 2729. Berlin: Springer-Verlag, 2003. 565–582Google Scholar
  7. 7.
    Shao J. Proxy re-cryptography revisited (in Chinese). PhD thesis. Shanghai: Shanghai Jiao Tong University. China Academic Journal Online Publication Integrated Database. 2008Google Scholar
  8. 8.
    Deng R H, Weng J, Liu S, et al. Chosen-ciphertext secure proxy re-encryption without pairings. In: Franklin M K, Hui L C K, Wong D S, eds. CANS. Lecture Notes in Computer Science, Vol. 5339. Berlin: Springer-Verlag, 2008. 1–17Google Scholar
  9. 9.
    Shao J, Cao Z. CCA-secure proxy re-encryption without pairings. In: Jarecki S, Tsudik G, eds. Public Key Cryptography. Lecture Notes in Computer Science, Vol. 5443. Berlin: Springer-Verlag, 2009. 357–376Google Scholar
  10. 10.
    Tang Q. Type-based proxy re-encryption and its construction. In: Chowdhury D R, Rijmen V, Das A, eds. INDOCRYPT. Lecture Notes in Computer Science, Vol. 5365. Berlin: Springer-Verlag, 2008. 130–144CrossRefGoogle Scholar
  11. 11.
    Weng J, Deng R H, Ding X, et al. Conditional proxy re-encryption secure against chosen-ciphertext attack. In: Li W, Susilo W, Tupakula U K, et al., eds. ASIACCS. New York: ACM, 2009. 322–332CrossRefGoogle Scholar
  12. 12.
    Weng J, Yang Y, Tang Q, et al. Effcient conditional proxy re-encryption with chosen-ciphertext security. In: Samarati P, Yung M, Martinelli F, eds. ISC. Lecture Notes in Computer Science, Vol. 5735. Berlin: Springer-Verlag, 2009. 151–166Google Scholar
  13. 13.
    Chu C K, Weng J, Chow S S M, et al. Conditional proxybroadcast re-encryption. In: Boyd C, Nieto J M G, eds. ACISP. Lecture Notes in Computer Science, Vol. 5594. Berlin: Springer-Verlag, 2009. 327–342Google Scholar
  14. 14.
    Libert B, Vergnaud D. Tracing malicious proxies in proxy re-encryption. In: Galbraith S D, Paterson K G, eds. Pairing. Lecture Notes in Computer Science, Vol. 5209. Berlin: Springer-Verlag, 2008. 332–353Google Scholar
  15. 15.
    Matsuo T. Proxy re-encryption systems for identity-based encryption. In: Takagi T, Okamoto T, Okamoto E, eds. Pairing. Lecture Notes in Computer Science, Vol. 4575. Berlin: Springer-Verlag, 2007. 247–267Google Scholar
  16. 16.
    Green M, Ateniese G. Identity-based proxy re-encryption. In: Katz J, Yung M, eds. ACNS. Lecture Notes in Computer Science, Vol. 4521. Berlin: Springer-Verlag, 2007. 288–306Google Scholar
  17. 17.
    Chu C K, Tzeng W G. Identity-based proxy re-encryption without random oracles. In: Garay J A, Lenstra A K, Mambo M. et al. eds. ISC. Lecture Notes in Computer Science, Vol. 4779. Berlin: Springer-Verlag, 2007. 189–202Google Scholar
  18. 18.
    Cramer R, Shoup V. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J Comput, 2004, 33: 167–226CrossRefMathSciNetGoogle Scholar
  19. 19.
    Goldreich O, Goldwasser S, Micali S. How to construct random functions. J ACM, 1986, 33: 792–807CrossRefMathSciNetGoogle Scholar
  20. 20.
    Boneh D, Boyen X.E Effcient selective-ID secure identity-based encryption without Random Oracles. In: Cachin C, Camenisch J, eds. Eurocrypt. Lecture Notes in Computer Science, Vol. 3027. Berlin: Springer-Verlag, 2004. 223–238Google Scholar
  21. 21.
    Hohenberger S, Waters B. Realizing hash-and-sign signatures under standard assumptions. In: Joux A, ed. Eurocrypt. Lecture Notes in Computer Science, Vol. 5479. Berlin: Springer-Verlag, 2009. 333–350Google Scholar
  22. 22.
    Coron J S. On the exact security of full domain hash. In: Bellare M, ed. Crypto. Lecture Notes in Computer Science, Vol. 1880. Berlin: Springer-Verlag, 2000. 229–235Google Scholar

Copyright information

© Science in China Press and Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Jian Weng
    • 1
    • 2
  • MinRong Chen
    • 3
  • YanJiang Yang
    • 4
  • Robert Deng
    • 2
  • KeFei Chen
    • 5
  • Feng Bao
    • 4
  1. 1.Department of Computer ScienceJinan UniversityGuangzhouChina
  2. 2.School of Information SystemsSingapore Management UniversitySingaporeSingapore
  3. 3.College of Information EngineeringShenzhen UniversityShenzhenChina
  4. 4.Institute for Infocomm Research (I2R)SingaporeSingapore
  5. 5.Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghaiChina

Personalised recommendations