Abstract
We address the cryptographic topic of proxy re-encryption (PRE), which is a special public-key cryptosystem. A PRE scheme allows a special entity, known as the proxy, to transform a message encrypted with the public key of a delegator (say Alice), into a new ciphertext that is protected under the public key of a delegatee (say Bob), and thus the same message can then be recovered with Bob’s private key. In this paper, in the identity-based setting, we first investigate the relationship between so called mediated encryption and unidirectional PRE. We provide a general framework which converts any secure identity-based unidirectional PRE scheme into a secure identity-based mediated encryption scheme, and vice versa. Concerning the security for unidirectional PRE schemes, Ateniese et al. previously suggested an important property known as the master secret security, which requires that the coalition of the proxy and Bob cannot expose Alice’s private key. In this paper, we extend the notion to the identity-based setting, and present an identity-based unidirectional PRE scheme, which not only is provably secure against the chosen ciphertext attack in the standard model but also achieves the master secret security at the same time.
Similar content being viewed by others
References
Shamir A. Identity-based cryptosystems and signature schemes. In Proc. Crypto1984, Santa Babara, USA, Aug. 19-22, 1984, pp.47-53.
Boneh D, Franklin M. Identity based encryption from the Weil pairing. In Proc. Crypto 2001, Santa Barbara, USA, Aug. 19-23, 2001, pp.213-229.
Boneh D, Boyen X. Efficient selective-ID secure identity-based encryption without random oracles. In Proc. Eurocrypt 2004, Paris, France, April 9-11, 2004, pp.223-238.
Boneh D, Boyen X. Secure identity based encryption without random oracles. In Proc. Crypto 2004, Santa Barbara, USA, Aug. 15-19, 2004, pp.443-459.
Waters B. Efficient identity-based encryption without random oracles. In Proc. Eurocrypt 2005, Aarhus, Denmark, May 22-26, 2005, pp.114-127.
Gentry C. Practical identity-based encryption without random oracles. In Proc. Eurocrypt 2006, St. Petersburg, Russia, May 28-June 1, 2006, pp.445-464.
Boneh D, Gentry C, Hamburg M. Space-efficient identity based encryption without pairings. In Proc. the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), Rhode Island, USA, Oct. 20-23, 2007, pp.647-657.
Boneh D, Ding X, Tsudik G, Wong C M. A method for fast revocation of public key certificates and security capabilities. In Proc. the 10th USENIX Security Symposium, Washington DC, USA, Aug. 13-17, 2001, pp.297-310.
Ding X, Tsudik G. Simple identity-based cryptography with mediated RSA. In Proc. CT-RSA2003, San Francisco, USA, April 13-17, 2003, pp.193-210.
Libert B, Quisquater J J. Efficient revocation and threshold pairing based cryptosystems. In Proc. the 22nd ACM Symposium on Principles of Distributed Computing (PODC2003), Boston, USA, July 13-16, 2003, pp.163-171.
Baek J, Zheng Y. Identity-based threshold decryption. In Proc. PKC 2004, Singapore, March 1-4, 2004, pp.262-276.
Bellare M, Rogaway P. Random oracles are practical: A paradigm for designing efficient protocols. In Proc. the 1st ACM Conference on Computer and Communications Security (CCS 1993), Fairfax, USA, Nov. 3-5, 1993, pp.62-73.
Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography. In Proc. Eurocrypt 1998, Espoo, Finland, May 31-June 4, 1998, pp.127-144.
Ateniese G, Fu K, Green M, Hohenberger S. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security, Feb. 2006, 9(1): 1-30.
Canetti R, Hohenberger S. Chosen-ciphertext secure proxy reencryption. In Proc. the 14th ACM Conference on Computer and Communications Security (CCS 2007), Singapore, March 20-22, 2007, pp.185-194.
Libert B, Vergnaud D. Unidirectional chosen-ciphertext secure proxy re-encryption. In Proc. PKC 2008, Barcelona, Spain, March 9-12, 2008, pp.360-379.
Deng R H, Weng J, Liu S, Chen K. Chosen-ciphertext secure proxy re-encryption without pairings. In Proc. CANS 2008, Hong Kong, China, Dec. 2-4, 2008, pp.1-17.
Shao J, Cao Z. CCA-secure proxy re-encryption without pairings. In Proc. PKC 2009, Irvine, USA, March 18-20, 2009, pp.357-376.
Green M, Ateniese G. Identity-based proxy re-encryption. In Proc. ACNS 2007, Zhuhai, China, June 5-8, 2007, pp.288-306.
Chu C K, Tzeng W G. Identity-based proxy re-encryption without random oracles. In Proc. ISC2007, Valparaiso, Chile, Oct. 9-12, 2007, pp.189-202.
Shao J, Xing D, Cao Z. Identity-based proxy re-encryption schemes with multiuse, unidirection, and CCA security. Cryptology ePrint Archive, Report 2008/103, 2008.
Boyen X, Mei Q, Waters B. Direct chosen ciphertext security from identity based techniques. In Proc. the 12th ACM Conference on Computer and Communications Security (CCS 2005), Taipei, China, March 21-24, 2005, pp.320-329.
Abdalla M, Catalano D, Dent A W, Malone-Lee J, Neven G, Smart N P. Identity-based encryption gone wild. In Proc. ICALP2006, Venice, Italy, July 9-16, 2006, pp.300-311.
Abdalla M, Kiltz E, Neven G. Generalized key delegation for hierarchical identity-based encryption. In Proc. ESORICS 2007, Dresden, Germany, Sept. 24-26, 2007, pp.139-154.
Naccache D. Secure and practical identity-based encryption. IET Information Security, June 2007, 1(2): 59-64.
Chatterjee S, Sarkar P. Trading time for space: Towards an efficient IBE scheme with short(er) public parameters in the standard model. In Proc. ICISC 2005, Seoul, Korea, Dec. 1-2, 2005, pp.424-440.
Chatterjee S, Sarkar P. HIBE with short public parameters without random oracle. In Proc. ASIACRYPT2006, Shanghai, China, Dec. 3-7, 2006, pp.145-160.
Author information
Authors and Affiliations
Corresponding author
Additional information
This work is partially supported by the National Natural Science Foundation of China under Grant No. 60873229 and Shanghai Rising-Star Program under Grant No. 09QA1403000, and the Office of Research, Singapore Management University.
Rights and permissions
About this article
Cite this article
Lai, JZ., Zhu, WT., Deng, R.H. et al. New Constructions for Identity-Based Unidirectional Proxy Re-Encryption. J. Comput. Sci. Technol. 25, 793–806 (2010). https://doi.org/10.1007/s11390-010-9366-5
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11390-010-9366-5