A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme

  • Arinjita PaulEmail author
  • Varshika Srinivasavaradhan
  • S. Sharmila Deva Selvi
  • C. Pandu Rangan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11192)


Cloud storage enables its users to store confidential information as encrypted files in the cloud. A cloud user (say Alice) can share her encrypted files with another user (say Bob) by availing proxy re-encryption services of the cloud. Proxy Re-Encryption (PRE) is a cryptographic primitive that allows transformation of ciphertexts from Alice to Bob via a semi-trusted proxy, who should not learn anything about the shared message. Typically, the re-encryption rights are enabled only for a bounded, fixed time and malicious parties may want to decrypt or learn messages encrypted for Alice, even beyond that time. The basic security notion of PRE assumes the proxy (cloud) is semi-trusted, which is seemingly insufficient in practical applications. The proxy may want to collude with Bob to obtain the private keys of Alice for later use. Such an attack is called collusion attack, allowing colluders to illegally access all encrypted information of Alice in the cloud. Hence, achieving collusion resistance is indispensable to real-world scenarios. Realizing collusion-resistant PRE has been an interesting problem in the ID-based setting. To this end, several attempts have been made to construct a collusion-resistant IB-PRE scheme and we discuss their properties and weaknesses in this paper. We also present a new collusion-resistant IB-PRE scheme that meets the adaptive CCA security under the decisional bilinear Diffie-Hellman hardness assumption in the random oracle model.


Identity-based proxy re-encryption Collusion-resistance Random oracle Unidirectional CCA-secure 



The authors would like to thank the anonymous referees for their helpful comments. The authors gratefully acknowledge the partial support of the Ministry of Electronics & Information Technology, Government of India under Project No. CCE/CEP/22/VK&CP/CSE/14-15 on Information Security & Awareness(ISEA) Phase-II.


  1. 1.
    Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS (2005)Google Scholar
  2. 2.
    Ateniese, G., Kevin, F., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 9(1), 1–30 (2006)CrossRefGoogle Scholar
  3. 3.
    Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). Scholar
  4. 4.
    Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001). Scholar
  5. 5.
    Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptol. 17(4), 297–319 (2004)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Chow, S.S.M., Weng, J., Yang, Y., Deng, R.H.: Efficient unidirectional proxy re-encryption. IACR Cryptology ePrint Archive, 2009:189 (2009)Google Scholar
  7. 7.
    Chow, S.S.M., Weng, J., Yang, Y., Deng, R.H.: Efficient unidirectional proxy re-encryption. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 316–332. Springer, Heidelberg (2010). Scholar
  8. 8.
    Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288–306. Springer, Heidelberg (2007). Scholar
  9. 9.
    Han, J., Susilo, W., Mu, Y.: Identity-based data storage in cloud computing. Future Gener. Comput. Syst. 29(3), 673–681 (2013)CrossRefGoogle Scholar
  10. 10.
    Koo, W.K., Hwang, J.Y., Lee, D.H.: Security vulnerability in a non-interactive id-based proxy re-encryption scheme. Inf. Process. Lett. 109(23), 1260–1262 (2009)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Libert, B., Vergnaud, D.: Tracing malicious proxies in proxy re-encryption. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 332–353. Springer, Heidelberg (2008). Scholar
  12. 12.
    Qiu, J., Jo, J., Lee, H.: Collusion-resistant identity-based proxy re-encryption without random oracles. Int. J. Secur. Appl. 9(9), 337–344 (2015)Google Scholar
  13. 13.
    Shao, J., Cao, Z., Liu, P.: SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. Secur. Commun. Netw. 4(2), 122–135 (2011)CrossRefGoogle Scholar
  14. 14.
    Srinivasavaradhan, V., Paul, A., Sharmila Deva Selvi, S., Pandu Rangan, C.: A CCA-secure collusion-resistant identity-based proxy re-encryption scheme (full version). Cryptology ePrint Archive, August 2018Google Scholar
  15. 15.
    Smith, T: DVD Jon: buy DRM-less tracks from Apple iTunes (2005). pymusique
  16. 16.
    Sree Vivek, S., Sharmila Deva Selvi, S., Radhakishan, V., Pandu Rangan, C.: Efficient conditional proxy re-encryption with chosen ciphertext security. Int. J. Netw. Secur. Appl. 4(2), 179 (2012)zbMATHGoogle Scholar
  17. 17.
    Wang, H., Zeng, P., Choo, K.-K.R.: MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption. Securi. Commun. Netw. 7(11), 1641–1651 (2014)CrossRefGoogle Scholar
  18. 18.
    Wang, L., Wang, L., Mambo, M., Okamoto, E.: New identity-based proxy re-encryption schemes to prevent collusion attacks. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol. 6487, pp. 327–346. Springer, Heidelberg (2010). Scholar
  19. 19.
    Wang, X.A., Zhong, W.: A new identity based proxy re-encryption scheme. In: 2010 International Conference on Biomedical Engineering and Computer Science, pp. 1–4, April 2010Google Scholar
  20. 20.
    Zhang, L., Ma, H., Liu, Z., Dong, E.: Security analysis and improvement of a collusion-resistant identity-based proxy re-encryption scheme. In: Barolli, L., Xhafa, F., Yim, K. (eds.) Advances on Broad-Band Wireless Computing, Communication and Applications. LNDECT, vol. 2, pp. 839–846. Springer, Cham (2017). Scholar

Copyright information

© Springer Nature Switzerland AG 2018

Authors and Affiliations

  • Arinjita Paul
    • 2
    Email author
  • Varshika Srinivasavaradhan
    • 1
  • S. Sharmila Deva Selvi
    • 2
  • C. Pandu Rangan
    • 2
  1. 1.Thiagarajar College of EngineeringMaduraiIndia
  2. 2.Theoretical Computer Science Lab, Department of Computer Science and EngineeringIndian Institute of Technology MadrasChennaiIndia

Personalised recommendations