Secure Certificateless Proxy Re-encryption Without Pairing

  • Veronika KuchtaEmail author
  • Gaurav Sharma
  • Rajeev Anand Sahu
  • Tarunpreet Bhatia
  • Olivier Markowitch
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10418)


A Proxy Re-encryption (PRE) is a cryptographic scheme for delegation of decryption rights. In a PRE scheme, a semi-honest proxy agent of Bob re-encrypts the ciphertext, on the message intended for Alice, on behalf of Bob, without learning anything about the message. The PRE schemes are useful in the scenarios where data are desired to be shared with the authorized users over the cloud. For such important applications, in this paper, we present an efficient and secure proxy re-encryption scheme. To avoid the overhead due to certification and to get rid of the key escrow issue of identity-based setting, we construct our scheme on the certificateless setting. The scheme has been proved secure in random oracle model under the standard assumption, the hardness of the computational Diffie-Hellman problem (CDHP). Moreover, as we device a pairing-free construction, our scheme is significantly more efficient than the best available scheme.


Certificateless proxy re-encryption Secure data sharing Computational Diffie-Hellman (CDH) problem Random oracle model 


  1. 1.
    Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 452–473. Springer (2003)Google Scholar
  2. 2.
    Ateniese, G., Kevin, F., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inform. Syst. Secur. (TISSEC) 9(1), 1–30 (2006)CrossRefzbMATHGoogle Scholar
  3. 3.
    Baek, J., Safavi-Naini, R., Susilo, W.: Certificateless public key encryption without pairing. In: Zhou, J., Lopez, J., Deng, R.H., Bao, F. (eds.) ISC 2005. LNCS, vol. 3650, pp. 134–148. Springer, Heidelberg (2005). doi: 10.1007/11556992_10 CrossRefGoogle Scholar
  4. 4.
    Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144. Springer, Heidelberg (1998). doi: 10.1007/BFb0054122 CrossRefGoogle Scholar
  5. 5.
    Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 185–194. ACM (2007)Google Scholar
  6. 6.
    Cao, X., Kou, W., Xiaoni, D.: A pairing-free identity-based authenticated key agreement protocol with minimal message exchanges. Inf. Sci. 180(15), 2895–2903 (2010)MathSciNetCrossRefzbMATHGoogle Scholar
  7. 7.
    Chow, S.S.M., Weng, J., Yang, Y., Deng, R.H.: Efficient unidirectional proxy re-encryption. In: Bernstein, D.J., Lange, T. (eds.) AFRICACRYPT 2010. LNCS, vol. 6055, pp. 316–332. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-12678-9_19 CrossRefGoogle Scholar
  8. 8.
    Chu, C.-K., Tzeng, W.-G.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 189–202. Springer, Heidelberg (2007). doi: 10.1007/978-3-540-75496-1_13 CrossRefGoogle Scholar
  9. 9.
    Debiao, H., Jianhua, C, Jin, H.: An id-based proxy signature schemes without bilinear pairings. annals of telecommunications-annales des télécommunications 66(11–12), 657–662 (2011)Google Scholar
  10. 10.
    Dutta, R., Barua, R., Sarkar, P.: Pairing-based cryptographic protocols: A survey. IACR Cryptology ePrint Archive 2004, 64 (2004)Google Scholar
  11. 11.
    Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288–306. Springer, Heidelberg (2007). doi: 10.1007/978-3-540-72738-5_19 CrossRefGoogle Scholar
  12. 12.
    Guo, H., Zhang, Z., Zhang, J., Chen, C.: Towards a secure certificateless proxy re-encryption scheme. In: Susilo, W., Reyhanitabar, R. (eds.) ProvSec 2013. LNCS, vol. 8209, pp. 330–346. Springer, Heidelberg (2013). doi: 10.1007/978-3-642-41227-1_19 CrossRefGoogle Scholar
  13. 13.
    Heydt-Benjamin, T.S., Chae, H.-J., Defend, B., Fu, K.: Privacy for public transportation. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 1–19. Springer, Heidelberg (2006). doi: 10.1007/11957454_1 CrossRefGoogle Scholar
  14. 14.
    Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Kutyłowski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8712, pp. 257–272. Springer, Cham (2014). doi: 10.1007/978-3-319-11203-9_15 Google Scholar
  15. 15.
    Liang, K., Susilo, W., Liu, J.K., Wong, D.S.: Efficient and fully CCA secure conditional proxy re-encryption from hierarchical identity-based encryption. Comput. J. 58, 2778–2792 (2015)Google Scholar
  16. 16.
    Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360–379. Springer, Heidelberg (2008). doi: 10.1007/978-3-540-78440-1_21 CrossRefGoogle Scholar
  17. 17.
    Lu, Y., Li, J.: A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds. Future Gener. Comput. Syst. 62, 140–147 (2016)CrossRefGoogle Scholar
  18. 18.
    MIRACL. Multiprecision integer and rational arithmetic cryptographic library.
  19. 19.
    Qin, Z., Wu, S., Xiong, H.: Strongly secure and cost-effective certificateless proxy re-encryption scheme for data sharing in cloud computing. In: Wang, Y., Xiong, H., Argamon, S., Li, X.Y., Li, J.Z. (eds.) BigCom 2015. LNCS, vol. 9196, pp. 205–216. Springer, Cham (2015). doi: 10.1007/978-3-319-22047-5_17 CrossRefGoogle Scholar
  20. 20.
    Shao, J., Cao, Z.: CCA-secure proxy re-encryption without pairings. In: Jarecki, S., Tsudik, G. (eds.) PKC 2009. LNCS, vol. 5443, pp. 357–376. Springer, Heidelberg (2009). doi: 10.1007/978-3-642-00468-1_20 CrossRefGoogle Scholar
  21. 21.
    Shao, J., Cao, Z.: Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Inf. Sci. 206, 83–95 (2012)MathSciNetCrossRefzbMATHGoogle Scholar
  22. 22.
    Srinivasan, A., Pandu Rangan, C.: Certificateless proxy re-encryption without pairing. IACR Cryptology ePrint Archive, 2014:933 (2014)Google Scholar
  23. 23.
    Sur, C., Jung, C.D., Park, Y., Rhee, K.H.: Chosen-ciphertext secure certificateless proxy re-encryption. In: Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010. LNCS, vol. 6109, pp. 214–232. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-13241-4_20 CrossRefGoogle Scholar
  24. 24.
    Wang, L., Wang, L., Mambo, M., Okamoto, E.: New identity-based proxy re-encryption schemes to prevent collusion attacks. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol. 6487, pp. 327–346. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-17455-1_21 CrossRefGoogle Scholar
  25. 25.
    Xu, L., Wu, X., Zhang, X.: Cl-pre: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security, pp. 87–88. ACM (2012)Google Scholar
  26. 26.
    Yang, K., Xu, J., Zhang, Z.: Certificateless proxy re-encryption without pairings. In: Lee, H.-S., Han, D.-G. (eds.) ICISC 2013. LNCS, vol. 8565, pp. 67–88. Springer, Cham (2014). doi: 10.1007/978-3-319-12160-4_5 Google Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Veronika Kuchta
    • 1
    Email author
  • Gaurav Sharma
    • 1
  • Rajeev Anand Sahu
    • 1
  • Tarunpreet Bhatia
    • 2
  • Olivier Markowitch
    • 1
  1. 1.Universite Libre de BruxellesBrusselsBelgium
  2. 2.Thapar UniversityPatialaIndia

Personalised recommendations