Advertisement

RSA-Based Collusion Resistant Quorum Controlled Proxy Re-encryption Scheme for Distributed Secure Communication

  • Shravani Mahesh Patil
  • B. R. Purushothama
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11319)

Abstract

In this paper, we analyze the quorum controlled proxy re-encryption scheme proposed by Jakobsson for the security. We show that the scheme is susceptible to collusion and cannot be used for secure communication. We design a new quorum controlled proxy re-encryption scheme based on RSA public key cryptosystem. We show that the proposed scheme is collusion resistant and non-transitive. Using the quorum/threshold controlled proxy re-encryption scheme, the trust on the proxy can be reduced and single point of failure problem can be solved. The proposed scheme can be used in any network application where distribution of trust and delegation of tasks are the requirements.

Keywords

Threshold proxy re-encryption Distributed trust Collusion resistant 

Notes

Acknowledgements

This work is supported by Ministry of Human Resource Development (MHRD), Government of India.

References

  1. 1.
    Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC 2006) 9(1), 1–30 (2006).  https://doi.org/10.1145/1127345.1127346CrossRefzbMATHGoogle Scholar
  2. 2.
    Bellare, M., Sandhu, R.S.: The security of practical two-party RSA signature schemes. IACR Cryptology ePrint Archive 2001, 60 (2001). https://eprint.iacr.org/2001/060.pdf
  3. 3.
    Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998).  https://doi.org/10.1007/BFb0054122CrossRefGoogle Scholar
  4. 4.
    Chen, Y.R., Tygar, J.D., Tzeng, W.G.: Secure group key management using uni-directional proxy re-encryption schemes. In: Proceedings of the 2011 IEEE International Conference on Computer Communications INFOCOM 2011, pp. 1952–1960, April 2011.  https://doi.org/10.1109/INFCOM.2011.5934999
  5. 5.
    Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, New York (1990).  https://doi.org/10.1007/0-387-34805-0_28CrossRefGoogle Scholar
  6. 6.
    Horowitz, E., Sahni, S., Rajasekaran, S.: Fundamentals of Computer Algorithms, 2nd edn. Silicon Press, Summit (2007)zbMATHGoogle Scholar
  7. 7.
    Ivan, A., Dodis, Y.: Proxy cryptography revisited. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2003). https://www.ndss-symposium.org/ndss2003/proxy-cryptography-revisited/
  8. 8.
    Jakobsson, M.: On quorum controlled asymmetric proxy re-encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 112–121. Springer, Heidelberg (1999).  https://doi.org/10.1007/3-540-49162-7_9CrossRefGoogle Scholar
  9. 9.
    Lin, H.Y., Tzeng, W.G.: A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans. Parallel Distrib. Syst. 23(6), 995–1003 (2012).  https://doi.org/10.1109/TPDS.2011.252CrossRefGoogle Scholar
  10. 10.
    Liu, Q., Wang, G., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258, 355–370 (2014).  https://doi.org/10.1016/j.ins.2012.09.034CrossRefGoogle Scholar
  11. 11.
    Mambo, M., Okamoto, E.: Proxy cryptosystems: delegation of the power to decrypt ciphertexts. Inst. Electron. Inf. Commun. Eng. (IEICE) Trans. Fundam. Electron. Commun. Comput. Sci. 80(1), 54–63 (1997)Google Scholar
  12. 12.
    Pareek, G., Purushothama, B.R.: On efficient access control mechanisms in hierarchy using unidirectional and transitive proxy re-encryption schemes. In: SECRYPT, pp. 519–524. SciTePress (2017).  https://doi.org/10.5220/0006466405190524
  13. 13.
    Pedersen, T.P.: A Threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991).  https://doi.org/10.1007/3-540-46416-6_47CrossRefGoogle Scholar
  14. 14.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979).  https://doi.org/10.1145/359168.359176MathSciNetCrossRefzbMATHGoogle Scholar
  15. 15.
    Tysowski, P.K., Hasan, M.A.: Hybrid attribute- and re-encryption-based key management for secure and scalable mobile applications in clouds. IEEE Trans. Cloud Comput. 1(2), 172–186 (2013).  https://doi.org/10.1109/TCC.2013.11CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNational Institute of Technology GoaPondaIndia

Personalised recommendations