Skip to main content
Log in

New Constructions for Identity-Based Unidirectional Proxy Re-Encryption

  • Regular Paper
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

We address the cryptographic topic of proxy re-encryption (PRE), which is a special public-key cryptosystem. A PRE scheme allows a special entity, known as the proxy, to transform a message encrypted with the public key of a delegator (say Alice), into a new ciphertext that is protected under the public key of a delegatee (say Bob), and thus the same message can then be recovered with Bob’s private key. In this paper, in the identity-based setting, we first investigate the relationship between so called mediated encryption and unidirectional PRE. We provide a general framework which converts any secure identity-based unidirectional PRE scheme into a secure identity-based mediated encryption scheme, and vice versa. Concerning the security for unidirectional PRE schemes, Ateniese et al. previously suggested an important property known as the master secret security, which requires that the coalition of the proxy and Bob cannot expose Alice’s private key. In this paper, we extend the notion to the identity-based setting, and present an identity-based unidirectional PRE scheme, which not only is provably secure against the chosen ciphertext attack in the standard model but also achieves the master secret security at the same time.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Shamir A. Identity-based cryptosystems and signature schemes. In Proc. Crypto1984, Santa Babara, USA, Aug. 19-22, 1984, pp.47-53.

  2. Boneh D, Franklin M. Identity based encryption from the Weil pairing. In Proc. Crypto 2001, Santa Barbara, USA, Aug. 19-23, 2001, pp.213-229.

  3. Boneh D, Boyen X. Efficient selective-ID secure identity-based encryption without random oracles. In Proc. Eurocrypt 2004, Paris, France, April 9-11, 2004, pp.223-238.

  4. Boneh D, Boyen X. Secure identity based encryption without random oracles. In Proc. Crypto 2004, Santa Barbara, USA, Aug. 15-19, 2004, pp.443-459.

  5. Waters B. Efficient identity-based encryption without random oracles. In Proc. Eurocrypt 2005, Aarhus, Denmark, May 22-26, 2005, pp.114-127.

  6. Gentry C. Practical identity-based encryption without random oracles. In Proc. Eurocrypt 2006, St. Petersburg, Russia, May 28-June 1, 2006, pp.445-464.

  7. Boneh D, Gentry C, Hamburg M. Space-efficient identity based encryption without pairings. In Proc. the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), Rhode Island, USA, Oct. 20-23, 2007, pp.647-657.

  8. Boneh D, Ding X, Tsudik G, Wong C M. A method for fast revocation of public key certificates and security capabilities. In Proc. the 10th USENIX Security Symposium, Washington DC, USA, Aug. 13-17, 2001, pp.297-310.

  9. Ding X, Tsudik G. Simple identity-based cryptography with mediated RSA. In Proc. CT-RSA2003, San Francisco, USA, April 13-17, 2003, pp.193-210.

  10. Libert B, Quisquater J J. Efficient revocation and threshold pairing based cryptosystems. In Proc. the 22nd ACM Symposium on Principles of Distributed Computing (PODC2003), Boston, USA, July 13-16, 2003, pp.163-171.

  11. Baek J, Zheng Y. Identity-based threshold decryption. In Proc. PKC 2004, Singapore, March 1-4, 2004, pp.262-276.

  12. Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In Proc. the 1st ACM Conference on Computer and Communications Security (CCS 1993), Fairfax, USA, Nov. 3-5, 1993, pp.62-73.

  13. Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography. In Proc. Eurocrypt 1998, Espoo, Finland, May 31-June 4, 1998, pp.127-144.

  14. Ateniese G, Fu K, Green M, Hohenberger S. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security, Feb. 2006, 9(1): 1-30.

    Article  Google Scholar 

  15. Canetti R, Hohenberger S. Chosen-ciphertext secure proxy reencryption. In Proc. the 14th ACM Conference on Computer and Communications Security (CCS 2007), Singapore, March 20-22, 2007, pp.185-194.

  16. Libert B, Vergnaud D. Unidirectional chosen-ciphertext secure proxy re-encryption. In Proc. PKC 2008, Barcelona, Spain, March 9-12, 2008, pp.360-379.

  17. Deng R H, Weng J, Liu S, Chen K. Chosen-ciphertext secure proxy re-encryption without pairings. In Proc. CANS 2008, Hong Kong, China, Dec. 2-4, 2008, pp.1-17.

  18. Shao J, Cao Z. CCA-secure proxy re-encryption without pairings. In Proc. PKC 2009, Irvine, USA, March 18-20, 2009, pp.357-376.

  19. Green M, Ateniese G. Identity-based proxy re-encryption. In Proc. ACNS 2007, Zhuhai, China, June 5-8, 2007, pp.288-306.

  20. Chu C K, Tzeng W G. Identity-based proxy re-encryption without random oracles. In Proc. ISC2007, Valparaiso, Chile, Oct. 9-12, 2007, pp.189-202.

  21. Shao J, Xing D, Cao Z. Identity-based proxy re-encryption schemes with multiuse, unidirection, and CCA security. Cryptology ePrint Archive, Report 2008/103, 2008.

  22. Boyen X, Mei Q, Waters B. Direct chosen ciphertext security from identity based techniques. In Proc. the 12th ACM Conference on Computer and Communications Security (CCS 2005), Taipei, China, March 21-24, 2005, pp.320-329.

  23. Abdalla M, Catalano D, Dent A W, Malone-Lee J, Neven G, Smart N P. Identity-based encryption gone wild. In Proc. ICALP2006, Venice, Italy, July 9-16, 2006, pp.300-311.

  24. Abdalla M, Kiltz E, Neven G. Generalized key delegation for hierarchical identity-based encryption. In Proc. ESORICS 2007, Dresden, Germany, Sept. 24-26, 2007, pp.139-154.

  25. Naccache D. Secure and practical identity-based encryption. IET Information Security, June 2007, 1(2): 59-64.

    Article  Google Scholar 

  26. Chatterjee S, Sarkar P. Trading time for space: Towards an efficient IBE scheme with short(er) public parameters in the standard model. In Proc. ICISC 2005, Seoul, Korea, Dec. 1-2, 2005, pp.424-440.

  27. Chatterjee S, Sarkar P. HIBE with short public parameters without random oracle. In Proc. ASIACRYPT2006, Shanghai, China, Dec. 3-7, 2006, pp.145-160.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Robert H. Deng.

Additional information

This work is partially supported by the National Natural Science Foundation of China under Grant No. 60873229 and Shanghai Rising-Star Program under Grant No. 09QA1403000, and the Office of Research, Singapore Management University.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lai, JZ., Zhu, WT., Deng, R.H. et al. New Constructions for Identity-Based Unidirectional Proxy Re-Encryption. J. Comput. Sci. Technol. 25, 793–806 (2010). https://doi.org/10.1007/s11390-010-9366-5

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-010-9366-5

Keywords

Navigation