Addressing Leakage of Re-encryption Key in Proxy Re-encryption Using Trusted Computing
Proxy re-encryption is a cryptographic primitive enabling a proxy holding a re-encryption key to convert a ciphertext originally intended for Alice (delegator) into an encryption of the same message for Bob (delegatee). Proxy re-encryption is a useful tool, having many applications. However, we observe that the issue of re-encryption key leakage, where the delegatee acquires the re-encryption key from the proxy, has been neglected by virtually all of the existing work. Possession of the re-encryption key allows the delegatee to decrypt the delegator’s ciphertexts by himself, without necessarily turning to the proxy for conversion, which may contradict the delegator’s interest. In this work, we present a method to address this issue using trusted computing technology. Our proposal represents yet another application of trusted computing.
KeywordsProxy re-encryption trusted computing
Unable to display preview. Download preview PDF.
- 1.Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. In: Proc. NDSS 2005, pp. 29–43 (2005)Google Scholar
- 4.Caneti, R., Hohenberger, S.: Chosen-Ciphertext Secure Proxy Re-Encryption. In: Proc. ACM CCS (2007)Google Scholar
- 7.Dodis, Y., Ivan, A.-A.: Proxy Cryptography Revisited. In: Proc. of NDSS 2003 (2003)Google Scholar
- 14.Mambo, M., Okamoto, E.: Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts. IEICE Trans. Fund. Electronics Communications and Computer Science E80-A/1, 54–63 (1997)Google Scholar
- 16.Smith, T.: DVD Jon: Buy DRM-less Tracks from Apple iTunes (January 2005), http://www.theregister.co.uk/2005/03/18/itunespymusique
- 17.Zhang, X., Cheng, M.-R., Li, X.: Comments on Shao-Caos Unidirectional Proxy Re-Encryption Scheme from PKC 2009. Cryptology ePrint Archive, Report 2009/344 (2009), http://www.eprint.iacr.org/