RSA-Based Collusion Resistant Quorum Controlled Proxy Re-encryption Scheme for Distributed Secure Communication

  • Shravani Mahesh Patil
  • B. R. PurushothamaEmail author
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11319)


In this paper, we analyze the quorum controlled proxy re-encryption scheme proposed by Jakobsson for the security. We show that the scheme is susceptible to collusion and cannot be used for secure communication. We design a new quorum controlled proxy re-encryption scheme based on RSA public key cryptosystem. We show that the proposed scheme is collusion resistant and non-transitive. Using the quorum/threshold controlled proxy re-encryption scheme, the trust on the proxy can be reduced and single point of failure problem can be solved. The proposed scheme can be used in any network application where distribution of trust and delegation of tasks are the requirements.


Threshold proxy re-encryption Distributed trust Collusion resistant 



This work is supported by Ministry of Human Resource Development (MHRD), Government of India.


  1. 1.
    Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC 2006) 9(1), 1–30 (2006). Scholar
  2. 2.
    Bellare, M., Sandhu, R.S.: The security of practical two-party RSA signature schemes. IACR Cryptology ePrint Archive 2001, 60 (2001).
  3. 3.
    Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). Scholar
  4. 4.
    Chen, Y.R., Tygar, J.D., Tzeng, W.G.: Secure group key management using uni-directional proxy re-encryption schemes. In: Proceedings of the 2011 IEEE International Conference on Computer Communications INFOCOM 2011, pp. 1952–1960, April 2011.
  5. 5.
    Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307–315. Springer, New York (1990). Scholar
  6. 6.
    Horowitz, E., Sahni, S., Rajasekaran, S.: Fundamentals of Computer Algorithms, 2nd edn. Silicon Press, Summit (2007)zbMATHGoogle Scholar
  7. 7.
    Ivan, A., Dodis, Y.: Proxy cryptography revisited. In: Proceedings of the Network and Distributed System Security Symposium (NDSS) (2003).
  8. 8.
    Jakobsson, M.: On quorum controlled asymmetric proxy re-encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1999. LNCS, vol. 1560, pp. 112–121. Springer, Heidelberg (1999). Scholar
  9. 9.
    Lin, H.Y., Tzeng, W.G.: A secure erasure code-based cloud storage system with secure data forwarding. IEEE Trans. Parallel Distrib. Syst. 23(6), 995–1003 (2012). Scholar
  10. 10.
    Liu, Q., Wang, G., Wu, J.: Time-based proxy re-encryption scheme for secure data sharing in a cloud environment. Inf. Sci. 258, 355–370 (2014). Scholar
  11. 11.
    Mambo, M., Okamoto, E.: Proxy cryptosystems: delegation of the power to decrypt ciphertexts. Inst. Electron. Inf. Commun. Eng. (IEICE) Trans. Fundam. Electron. Commun. Comput. Sci. 80(1), 54–63 (1997)Google Scholar
  12. 12.
    Pareek, G., Purushothama, B.R.: On efficient access control mechanisms in hierarchy using unidirectional and transitive proxy re-encryption schemes. In: SECRYPT, pp. 519–524. SciTePress (2017).
  13. 13.
    Pedersen, T.P.: A Threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522–526. Springer, Heidelberg (1991). Scholar
  14. 14.
    Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979). Scholar
  15. 15.
    Tysowski, P.K., Hasan, M.A.: Hybrid attribute- and re-encryption-based key management for secure and scalable mobile applications in clouds. IEEE Trans. Cloud Comput. 1(2), 172–186 (2013). Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of Computer Science and EngineeringNational Institute of Technology GoaPondaIndia

Personalised recommendations