Advertisement

Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing

  • Yanjiang Yang
  • Liang Gu
  • Feng Bao
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6802)

Abstract

Proxy re-encryption is a cryptographic primitive enabling a proxy holding a re-encryption key to convert a ciphertext originally intended for Alice (delegator) into an encryption of the same message for Bob (delegatee). Proxy re-encryption is a useful tool, having many applications. However, we observe that the issue of re-encryption key leakage, where the delegatee acquires the re-encryption key from the proxy, has been neglected by virtually all of the existing work. Possession of the re-encryption key allows the delegatee to decrypt the delegator’s ciphertexts by himself, without necessarily turning to the proxy for conversion, which may contradict the delegator’s interest. In this work, we present a method to address this issue using trusted computing technology. Our proposal represents yet another application of trusted computing.

Keywords

Proxy re-encryption trusted computing 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. In: Proc. NDSS 2005, pp. 29–43 (2005)Google Scholar
  2. 2.
    Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. ACM Transactions on Information and System Security (TISSEC) 9(1), 1–30 (2006)CrossRefzbMATHGoogle Scholar
  3. 3.
    Blaze, M., Bleumer, G., Strauss, M.: Divertible Protocols and Atomic Proxy Cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998)CrossRefGoogle Scholar
  4. 4.
    Caneti, R., Hohenberger, S.: Chosen-Ciphertext Secure Proxy Re-Encryption. In: Proc. ACM CCS (2007)Google Scholar
  5. 5.
    Chu, C., Tzeng, W.: Identity-Based Proxy Re-Encryption without Random Oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 189–202. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  6. 6.
    Chow, S.M., Weng, J., Yang, Y., Deng, H.: Efficient Unidirectional Proxy Re-Encryption. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 316–332. Springer, Heidelberg (2010)CrossRefGoogle Scholar
  7. 7.
    Dodis, Y., Ivan, A.-A.: Proxy Cryptography Revisited. In: Proc. of NDSS 2003 (2003)Google Scholar
  8. 8.
    Deng, H., Weng, J., Liu, S., Chen, K.: Chosen-Ciphertext Secure Proxy Re-encryption without Pairings. In: Franklin, M.K., Hui, L.C.K., Wong, D.S. (eds.) CANS 2008. LNCS, vol. 5339, pp. 1–17. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  9. 9.
    Green, M., Ateniese, G.: Identity-Based Proxy Re-Encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288–306. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  10. 10.
    Golle, P., Jakobsson, M., Juels, A., Syverson, P.F.: Universal Re-Encryption for Mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)CrossRefGoogle Scholar
  11. 11.
    Libert, B., Vergnaud, D.: Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360–379. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  12. 12.
    Libert, B., Vergnaud, D.: Tracing Malicious Proxies in Proxy Re-Encryption. In: Galbraith, S.D., Paterson, K.G. (eds.) Pairing 2008. LNCS, vol. 5209, pp. 332–353. Springer, Heidelberg (2008)CrossRefGoogle Scholar
  13. 13.
    Matsuo, T.: Proxy Re-Encryption Systems for Identity-Based Encryption. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 247–267. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  14. 14.
    Mambo, M., Okamoto, E.: Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts. IEICE Trans. Fund. Electronics Communications and Computer Science E80-A/1, 54–63 (1997)Google Scholar
  15. 15.
    Shao, J., Cao, Z.: CCA-Secure Proxy Re-encryption without Pairings. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 357–376. Springer, Heidelberg (2009)CrossRefGoogle Scholar
  16. 16.
    Smith, T.: DVD Jon: Buy DRM-less Tracks from Apple iTunes (January 2005), http://www.theregister.co.uk/2005/03/18/itunespymusique
  17. 17.
    Zhang, X., Cheng, M.-R., Li, X.: Comments on Shao-Caos Unidirectional Proxy Re-Encryption Scheme from PKC 2009. Cryptology ePrint Archive, Report 2009/344 (2009), http://www.eprint.iacr.org/

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Yanjiang Yang
    • 1
  • Liang Gu
    • 2
  • Feng Bao
    • 1
  1. 1.Institute for Infocomm ResearchSingapore
  2. 2.Key Lab. of High Confidence Software TechnologiesPeking UniversityChina

Personalised recommendations