Skip to main content
Log in

Fuzzy conditional proxy re-encryption

  • Research Paper
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

Weng et al. introduced the notion of conditional proxy re-encryption (C-PRE), whereby only the ciphertext satisfying one condition set by Alice can be re-encrypted by the proxy. To achieve more fine-grained delegation on the condition set, we introduce a new cryptographic primitive called fuzzy conditional proxy re-encryption (FC-PRE) in which we view conditions in C-PRE as a set of descriptive keywords. A FC-PRE scheme allows for a proxy with the re-encryption key for a conditional keyword set, W, to re-encrypt a ciphertext encrypted with a conditional keyword set, W′, if and only if W and W′ are close to each other as measured by the “set overlap” distance metric. Therefore, our system allows a certain amount of error-tolerance in the conditions. We formalize the FC-PRE security model by incorporating the advantages in previous C-PRE. Finally, we present an efficient construction of FC-PRE scheme, and prove its CCA-security under the well-studied decisional bilinear Diffie-Hellman (DBDH) assumption in the random oracle model.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic proxy cryptography. In: Proceedings of EUROCRYPT 1998. LNCS, Vol 1403. Heidelberg: Springer, 1998. 127–144

    Google Scholar 

  2. Ateniese G, Fu K, Green M, et al. Improved proxy re-encryption schemes with applications to secure distributed storage. In: Proceedings of NDSS05, The Internet Society. San Diego: ACM, 2006. 1–30

    Google Scholar 

  3. Canetti R, Hohenberger S. Chosen-ciphertext secure proxy re-encryption. In: Proceedings of the 14th ACM Conference on Computer and Communications Security. New York: ACM, 2007. 185–194

    Chapter  Google Scholar 

  4. Chu C, Tzeng W. Identity-based proxy re-encryption without random oracles. In: Proceedings of ISC 2007. LNCS, Vol 4779. Heidelberg: Springer, 2007. 189–202

    Google Scholar 

  5. Green M, Ateniese G. Identity-based proxy re-encryption. In: Proceedings of ACNS 2007. LNCS, Vol 4521. Heidelberg: Springer, 2007. 288–306. Full version: Cryptology ePrint Archieve: Report 2006/473

    Google Scholar 

  6. Libert B, Vergnaud D. Unidirectional chosen-ciphertext secure proxy re-encryption. In: Proceedings of PKC 2008. LNCS, Vol 4939. Heidelberg: Springer, 2008. 360–379. Full paper: http://hal.inria.fr/inria-00339530/en/

    Google Scholar 

  7. Weng J, Chen M, Yang Y, et al. CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci China Inf Sci, 2010, 53: 593–606

    Article  MathSciNet  Google Scholar 

  8. Lai J, Zhu W, Deng R, et al. New constructions for identity-based unidirectional proxy re-encryption. J Comput Sci Technol, 2010, 25: 793–806

    Article  MathSciNet  Google Scholar 

  9. Deng R, Weng J, Liu S, et al. Chosen-cipertext secure proxy re-encryption without pairings. In: Proceedings of CANS 2008. LNCS, Vol 5339. Heidelberg: Springer, 2008. 1–17

    Google Scholar 

  10. Shao J, Cao Z. CCA-secure proxy re-encryption without pairings. In: Proceedings of PKC 2009. LNCS, Vol 5443. Heidelberg: Springer, 2009. 357–376

    Google Scholar 

  11. Chow S, Weng J, Yang Y, et al. Efficient unidirectional proxy re-encryption. In: Proceedings of AFRICACRYPT 2010. LNCS, Vol 6055. Heidelberg: Springer, 2010. 316–332

    Chapter  Google Scholar 

  12. Matsuda T, Nishimaki R, Tanaka K. CCA proxy re-encryption without bilinear maps in the standard model. In: Proceedings of PKC 2010. LNCS, Vol 6056. Heidelberg: Springer, 2010. 261–278

    Google Scholar 

  13. Weng J, Zhao Y L, Hanaoka G. On the security of a bidirectional proxy re-encryption scheme from PKC 2010. In: Proceedings of PKC 2011. Berlin: Springer Verlag, 2011. 284–295

    Google Scholar 

  14. Weng J, Deng R H, Chu C, et al. Conditional proxy re-encryption secure against chosen-ciphertext attack. In: Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security (ASIACCS2009). NY: Association for Computing Machinery, 2009. 322–332

    Chapter  Google Scholar 

  15. Weng J, Yang Y, Tang Q, et al. Efficient conditional proxy re-encryption with chosen-ciphertext security. In: Proceedings of the 12th International Conference onInformation Security (ISC 2009). Heidelberg: Springer Verlag, 2009. 151–166

    Google Scholar 

  16. Tang Q. Type-based proxy re-encryption and its construction. In: Proceedings of INDOCRYPT 2008. LNCS, Vol 5365. Heidelberg: Springer, 2008. 130–144

    Chapter  Google Scholar 

  17. Chu C, Weng J, Chow S, et al. Conditional proxy broadcast re-encryption. In: Proceedings of ACISP 2009. LNCS, Vol 5594. Heidelberg: Springer, 2009. 327–342

    Google Scholar 

  18. Fang L, Susilo W, Wang J. Anonymous conditional proxy re-encryption without random oracle. In: Proceedings of ProvSec 2009. LNCS, Vol 5848. Heidelberg: Springer, 2009. 47–60

    Google Scholar 

  19. Boneh D, Boyen X. Efficient selective-ID based encryption without random oracles. In: Proceedings of EUROCRYPT 2004. LNCS, Vol 3027. Heidelberg: Springer, 2004. 223–238

    Chapter  Google Scholar 

  20. Boneh D, Franklin M. Identity-based encryption from the weil pairing. In: Proceedings of CRYPTO 2001. LNCS, Vol 2139. Heidelberg: Springer, 2001. 231–229

    Google Scholar 

  21. Sahai A, Waters B. Fuzzy identity-based encryption. In: Proceedings of Eurocrypt 2005. LNCS 3494. Heidelberg: Springer, 2005. 457–473

    Chapter  Google Scholar 

  22. Baek J, Susilo W, Zhou J. New constructions of fuzzy identity-based encryption. In: Proceedings of ASIACCS 2007. NY: Association for Computing Machinery, 2007. 368–370

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to LiMing Fang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Fang, L., Wang, J., Ge, C. et al. Fuzzy conditional proxy re-encryption. Sci. China Inf. Sci. 56, 1–13 (2013). https://doi.org/10.1007/s11432-012-4623-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-012-4623-6

Keywords

Navigation