Advertisement

A Closer Look at Anonymous Proxy Re-Encryption Schemes

  • S. Sharmila Deva SelviEmail author
  • S. HarishEmail author
  • Swethashree Dhanabal
  • C. Pandu Rangan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11611)

Abstract

Anonymity is one of the most desired properties of a Proxy Re-encryption scheme. Any user communicating over the public channel, availing cloud for proxy re-encryption services requires that any entity (an attacker or cloud administrator) must not infer either the contents of the ciphertexts (confidentiality) or the identities of the participants (anonymity). It is clear that a proxy re-encryption scheme must be collusion-resistant to satisfy the anonymity notion. There are no CCA-secure collusion-resistant proxy re-encryption schemes in the literature which satisfy the anonymity property. In ASIA CCS ’14, an anonymous proxy re-encryption scheme was presented [14] and we present a weakness in the CCA-security proof of their scheme. We present the first proxy re-encryption scheme which is anonymous, collusion-resistant and prove its CCA-security in the random oracle model. We also design a simple, efficient, collusion-resistant CCA-secure proxy re-encryption scheme which is interesting in its own right. In fact, our anonymous scheme is an extension of our novel collusion-resistant scheme.

Keywords

Proxy re-encryption Anonymity Collusion resistance Random oracle model CCA Security 

Notes

Acknowledgments

This work is supported by Ministry of Electronics & Information Technology, Government of India under Project No. CCE/CEP/22/VK& CP/CSE/14-15 on ISEA-phase II.

References

  1. 1.
    Ateniese, G., Benson, K., Hohenberger, S.: Key-private proxy re-encryption. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 279–294. Springer, Heidelberg (2009).  https://doi.org/10.1007/978-3-642-00862-7_19CrossRefGoogle Scholar
  2. 2.
    Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9, 1–30 (2006)CrossRefGoogle Scholar
  3. 3.
    Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566–582. Springer, Heidelberg (2001).  https://doi.org/10.1007/3-540-45682-1_33CrossRefzbMATHGoogle Scholar
  4. 4.
    Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998).  https://doi.org/10.1007/BFb0054122CrossRefGoogle Scholar
  5. 5.
    Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: ACM Conference on Computer and Communications Security, pp. 185–194. ACM (2007)Google Scholar
  6. 6.
    Chow, S.S.M., Weng, J., Yang, Y., Deng, R.H.: Efficient unidirectional proxy re-encryption. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 316–332. Springer, Heidelberg (2010).  https://doi.org/10.1007/978-3-642-12678-9_19CrossRefGoogle Scholar
  7. 7.
    Isshiki, T., Nguyen, M.H., Tanaka, K.: Proxy re-encryption in a stronger security model extended from CT-RSA2012. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol. 7779, pp. 277–292. Springer, Heidelberg (2013).  https://doi.org/10.1007/978-3-642-36095-4_18CrossRefzbMATHGoogle Scholar
  8. 8.
    Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360–379. Springer, Heidelberg (2008).  https://doi.org/10.1007/978-3-540-78440-1_21CrossRefGoogle Scholar
  9. 9.
    Nuñez, D., Agudo, I., López, J.: Proxy re-encryption: analysis of constructions and its application to secure access delegation. J. Netw. Comput. Appl. 87, 193–209 (2017)CrossRefGoogle Scholar
  10. 10.
    Paul, A., Srinivasavaradhan, V., Sharmila Deva Selvi, S., Pandu Rangan, C.: A CCA-secure collusion-resistant identity-based proxy re-encryption scheme. In: Baek, J., Susilo, W., Kim, J. (eds.) ProvSec 2018. LNCS, vol. 11192, pp. 111–128. Springer, Cham (2018).  https://doi.org/10.1007/978-3-030-01446-9_7CrossRefGoogle Scholar
  11. 11.
    Sharmila Deva Selvi, S., Paul, A., Pandurangan, C.: A provably-secure unidirectional proxy re-encryption scheme without pairing in the random oracle model. In: Capkun, S., Chow, S.S.M. (eds.) CANS 2017. LNCS, vol. 11261, pp. 459–469. Springer, Cham (2018).  https://doi.org/10.1007/978-3-030-02641-7_21CrossRefGoogle Scholar
  12. 12.
    Shao, J., Liu, P., Wei, G., Ling, Y.: Anonymous proxy re-encryption. Secur. Commun. Netw. 5(5), 439–449 (2012)CrossRefGoogle Scholar
  13. 13.
    Shao, J., Liu, P., Zhou, Y.: Achieving key privacy without losing CCA security in proxy re-encryption. J. Syst. Softw. 85(3), 655–665 (2012)CrossRefGoogle Scholar
  14. 14.
    Zheng, Q., Zhu, W., Zhu, J., Zhang, X.: Improved anonymous proxy re-encryption with CCA security. In: ACM ASIACCS, Kyoto, Japan - 03–06 June 2014, pp. 249–258 (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Theoretical Computer Science Lab, Department of Computer Science and EngineeringIndian Institute of Technology MadrasChennaiIndia
  2. 2.PSG College of TechnologyCoimbatoreIndia

Personalised recommendations