A Closer Look at Anonymous Proxy Re-Encryption Schemes

  • S. Sharmila Deva SelviEmail author
  • S. HarishEmail author
  • Swethashree Dhanabal
  • C. Pandu Rangan
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11611)


Anonymity is one of the most desired properties of a Proxy Re-encryption scheme. Any user communicating over the public channel, availing cloud for proxy re-encryption services requires that any entity (an attacker or cloud administrator) must not infer either the contents of the ciphertexts (confidentiality) or the identities of the participants (anonymity). It is clear that a proxy re-encryption scheme must be collusion-resistant to satisfy the anonymity notion. There are no CCA-secure collusion-resistant proxy re-encryption schemes in the literature which satisfy the anonymity property. In ASIA CCS ’14, an anonymous proxy re-encryption scheme was presented [14] and we present a weakness in the CCA-security proof of their scheme. We present the first proxy re-encryption scheme which is anonymous, collusion-resistant and prove its CCA-security in the random oracle model. We also design a simple, efficient, collusion-resistant CCA-secure proxy re-encryption scheme which is interesting in its own right. In fact, our anonymous scheme is an extension of our novel collusion-resistant scheme.


Proxy re-encryption Anonymity Collusion resistance Random oracle model CCA Security 



This work is supported by Ministry of Electronics & Information Technology, Government of India under Project No. CCE/CEP/22/VK& CP/CSE/14-15 on ISEA-phase II.


  1. 1.
    Ateniese, G., Benson, K., Hohenberger, S.: Key-private proxy re-encryption. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 279–294. Springer, Heidelberg (2009). Scholar
  2. 2.
    Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9, 1–30 (2006)CrossRefGoogle Scholar
  3. 3.
    Bellare, M., Boldyreva, A., Desai, A., Pointcheval, D.: Key-privacy in public-key encryption. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566–582. Springer, Heidelberg (2001). Scholar
  4. 4.
    Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). Scholar
  5. 5.
    Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: ACM Conference on Computer and Communications Security, pp. 185–194. ACM (2007)Google Scholar
  6. 6.
    Chow, S.S.M., Weng, J., Yang, Y., Deng, R.H.: Efficient unidirectional proxy re-encryption. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 316–332. Springer, Heidelberg (2010). Scholar
  7. 7.
    Isshiki, T., Nguyen, M.H., Tanaka, K.: Proxy re-encryption in a stronger security model extended from CT-RSA2012. In: Dawson, E. (ed.) CT-RSA 2013. LNCS, vol. 7779, pp. 277–292. Springer, Heidelberg (2013). Scholar
  8. 8.
    Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360–379. Springer, Heidelberg (2008). Scholar
  9. 9.
    Nuñez, D., Agudo, I., López, J.: Proxy re-encryption: analysis of constructions and its application to secure access delegation. J. Netw. Comput. Appl. 87, 193–209 (2017)CrossRefGoogle Scholar
  10. 10.
    Paul, A., Srinivasavaradhan, V., Sharmila Deva Selvi, S., Pandu Rangan, C.: A CCA-secure collusion-resistant identity-based proxy re-encryption scheme. In: Baek, J., Susilo, W., Kim, J. (eds.) ProvSec 2018. LNCS, vol. 11192, pp. 111–128. Springer, Cham (2018). Scholar
  11. 11.
    Sharmila Deva Selvi, S., Paul, A., Pandurangan, C.: A provably-secure unidirectional proxy re-encryption scheme without pairing in the random oracle model. In: Capkun, S., Chow, S.S.M. (eds.) CANS 2017. LNCS, vol. 11261, pp. 459–469. Springer, Cham (2018). Scholar
  12. 12.
    Shao, J., Liu, P., Wei, G., Ling, Y.: Anonymous proxy re-encryption. Secur. Commun. Netw. 5(5), 439–449 (2012)CrossRefGoogle Scholar
  13. 13.
    Shao, J., Liu, P., Zhou, Y.: Achieving key privacy without losing CCA security in proxy re-encryption. J. Syst. Softw. 85(3), 655–665 (2012)CrossRefGoogle Scholar
  14. 14.
    Zheng, Q., Zhu, W., Zhu, J., Zhang, X.: Improved anonymous proxy re-encryption with CCA security. In: ACM ASIACCS, Kyoto, Japan - 03–06 June 2014, pp. 249–258 (2014)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Theoretical Computer Science Lab, Department of Computer Science and EngineeringIndian Institute of Technology MadrasChennaiIndia
  2. 2.PSG College of TechnologyCoimbatoreIndia

Personalised recommendations