Generic Traceable Proxy Re-encryption and Accountable Extension in Consensus Network

Proxy re-encryption provides a promising solution to share encrypted data in consensus network. When the data owner is going to share her encrypted data with some receiver, he will generate re-encryption key for this receiver and distribute the key among the consensus network nodes following some rules. By using the re-encryption key, the nodes can transform the ciphertexts for the receiver without learning anything about the underlying plaintexts. However, if malicious nodes and receivers collude, they can obtain the capability to decrypt all transformable ciphertexts of the data owner, especially for multi-nodes setting of consensus network. In order to address this problem, some “tracing mechanisms” are naturally required to identify misbehaving nodes and foster accountability when the re-encryption key is abused for distributing the decryption capability.

[1]  Hui Guo,et al.  Accountable Proxy Re-Encryption for Secure Data Sharing , 2018, IEEE Transactions on Dependable and Secure Computing.

[2]  Daniel Slamanig,et al.  Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications , 2018, Public Key Cryptography.

[3]  Brent Waters,et al.  Black-box accountable authority identity-based encryption , 2008, CCS.

[4]  Xiaolei Dong,et al.  Accountable Authority Ciphertext-Policy Attribute-Based Encryption with White-Box Traceability and Public Auditing in the Cloud , 2015, ESORICS.

[5]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[6]  Georg Fuchsbauer,et al.  Adaptively Secure Proxy Re-encryption , 2019, IACR Cryptol. ePrint Arch..

[7]  Hui Guo,et al.  Proxy Re-encryption with Unforgeable Re-encryption Keys , 2014, CANS.

[8]  Zhenfeng Zhang,et al.  PRE: Stronger security notions and efficient construction with non-interactive opening , 2014, Theor. Comput. Sci..

[9]  Jing Xu,et al.  Non-Transferable Proxy Re-Encryption , 2018, IACR Cryptol. ePrint Arch..

[10]  Hui Guo,et al.  Towards Secure Data Distribution Systems in Mobile Cloud Computing , 2017, IEEE Transactions on Mobile Computing.

[11]  Benoît Libert,et al.  Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys , 2008, Public Key Cryptography.

[12]  Ran Canetti,et al.  Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.

[13]  Aloni Cohen What about Bob? The Inadequacy of CPA Security for Proxy Reencryption , 2017, IACR Cryptol. ePrint Arch..

[14]  Qiang Tang,et al.  Type-Based Proxy Re-encryption and Its Construction , 2008, INDOCRYPT.

[15]  Vinod Vaikuntanathan,et al.  Functional Re-encryption and Collusion-Resistant Obfuscation , 2012, TCC.

[16]  Benoît Libert,et al.  Tracing Malicious Proxies in Proxy Re-encryption , 2008, Pairing.

[17]  Amit Sahai,et al.  Fully Secure Accountable-Authority Identity-Based Encryption , 2011, Public Key Cryptography.

[18]  Benoît Libert,et al.  Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption , 2008, Public Key Cryptography.

[19]  Aggelos Kiayias,et al.  Making Any Identity-Based Encryption Accountable, Efficiently , 2015, ESORICS.

[20]  Cristian Borcea,et al.  PICADOR: End-to-end encrypted Publish-Subscribe information distribution with proxy re-encryption , 2017, Future Gener. Comput. Syst..

[21]  Abhi Shelat,et al.  Securely Obfuscating Re-encryption , 2007, TCC.

[22]  Vipul Goyal,et al.  Reducing Trust in the PKG in Identity Based Cryptosystems , 2007, CRYPTO.

[23]  Serdar Pehlivanoglu,et al.  An asymmetric fingerprinting code for collusion-resistant buyer-seller watermarking , 2013, IH&MMSec '13.

[24]  Jin Li,et al.  Accountable Large-Universe Attribute-Based Encryption Supporting Any Monotone Access Structures , 2016, ACISP.

[25]  Steven Myers,et al.  Practical Revocation and Key Rotation , 2018, CT-RSA.

[26]  Alvaro A. Cárdenas,et al.  Towards a secure and interoperable DRM architecture , 2006, DRM '06.

[27]  Feng-Hao Liu,et al.  Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices , 2014, Public Key Cryptography.

[28]  Moni Naor,et al.  Traitor tracing with constant size ciphertext , 2008, CCS.

[29]  Birgit Pfitzmann,et al.  Asymmetric Fingerprinting (Extended Abstract) , 1996, EUROCRYPT.

[30]  Yunlei Zhao,et al.  Accountable Authority Identity-Based Encryption with Public Traceability , 2013, CT-RSA.

[31]  Hai Jin,et al.  Generally Hybrid Proxy Re-Encryption: A Secure Data Sharing among Cryptographic Clouds , 2016, AsiaCCS.

[32]  Robert H. Deng,et al.  CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles , 2010, Science China Information Sciences.

[33]  Junzuo Lai,et al.  Making Any Attribute-Based Encryption Accountable, Efficiently , 2018, ESORICS.

[34]  Nigel P. Smart,et al.  Identity-Based Encryption Gone Wild , 2006, ICALP.

[35]  Steven Myers,et al.  Efficient Hybrid Proxy Re-Encryption for Practical Revocation and Key Rotation , 2017, IACR Cryptol. ePrint Arch..

[36]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[37]  Yun Ling,et al.  Fine-Grained Two-Factor Protection Mechanism for Data Sharing in Cloud Storage , 2018, IEEE Transactions on Information Forensics and Security.

[38]  Koji Okada,et al.  Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption , 2011, IWSEC.