An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing

Proxy re-encryption (PRE) is a cryptographic primitive introduced by Blaze, Bleumer and Strauss [4] to provide delegation of decryption rights. PRE allows re-encryption of a ciphertext intended for Alice (delegator) to a ciphertext for Bob (delegatee) via a semi-honest proxy, who should not learn anything about the underlying message. In 2003, Al-Riyami and Patterson introduced the notion of certificateless public key cryptography which offers the advantage of identity-based cryptography without suffering from key escrow problem. The existing certificateless PRE (CLPRE) schemes rely on costly bilinear pairing operations. In ACM ASIA-CCS SCC 2015, Srinivasan \(et\ al.\) proposed the first construction of a certificateless PRE scheme without resorting to pairing in the random oracle model. In this work, we demonstrate a flaw in the CCA-security proof of their scheme. Also, we present the first construction of a CLPRE scheme without pairing which meets CCA security under the computational Diffie-Hellman hardness assumption in the random oracle model.

[1]  Robert H. Deng,et al.  Efficient Unidirectional Proxy Re-Encryption , 2010, AFRICACRYPT.

[2]  Adi Shamir,et al.  Identity-Based Cryptosystems and Signature Schemes , 1984, CRYPTO.

[3]  Cheng Chen,et al.  Towards a Secure Certificateless Proxy Re-Encryption Scheme , 2013, ProvSec.

[4]  Jonathan Katz,et al.  Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..

[5]  Zhenfeng Zhang,et al.  Certificateless Proxy Re-Encryption Without Pairings , 2013, ICISC.

[6]  Cong Wang,et al.  Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.

[7]  Youngho Park,et al.  Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption , 2010, Communications and Multimedia Security.

[8]  C. Pandu Rangan,et al.  Certificateless Proxy Re-Encryption Without Pairing: Revisited , 2015, SCC@ASIACCS.

[9]  Min-Rong Chen,et al.  Cryptanalysis of a Certificateless Proxy Re-encryption Scheme , 2013, 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies.

[10]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[11]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[12]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[13]  Benoît Libert,et al.  Tracing Malicious Proxies in Proxy Re-encryption , 2008, Pairing.

[14]  Jean-Sébastien Coron,et al.  On the Exact Security of Full Domain Hash , 2000, CRYPTO.

[15]  Kenneth G. Paterson,et al.  Certificateless Public Key Cryptography , 2003 .