Secure Non-transferable Proxy Re-encryption for Group Membership and Non-membership

In proxy re-encrytpion (PRE) scheme, the message is sent by a delegator to a delegatee with a help of the trusted third party proxy without knowing the existing plaintext. PRE schemes are widely used in various applications. However, the standard PRE scheme has some proxy problems called private key generator (PKG) despotism problem. This means that PKG can make re-encryption key without permission from delegator. And also, if someone can attack PKG in a PRE scheme, they can decrypt both the original ciphertext and the re-encrypted ciphertext which means the key-escrow problem. A solution for these two problems is to use non-transferable PRE scheme. Non-transferable PRE scheme solved the above PKG despotism problem and key-escrow problem. We would like to introduce our PRE scheme with a new approach. In our scheme, there are three sub-processes, which are based on a non-transferable PRE scheme and group signature. Our scheme will provide the security for delegator i, delegatee j (who is in the same group with delegator i), and delegatee k (who is in a different group with delegator i).

[1]  Siu-Ming Yiu,et al.  Non-Transferable Proxy Re-Encryption Scheme , 2012, 2012 5th International Conference on New Technologies, Mobility and Security (NTMS).

[2]  Yevgeniy Dodis,et al.  Proxy cryptography revisted , 2003 .

[3]  Alvaro A. Cárdenas,et al.  Towards a secure and interoperable DRM architecture , 2006, DRM '06.

[4]  Xavier Boyen,et al.  Proxy Re-Encryption Schemes with Key Privacy from LWE , 2016, IACR Cryptol. ePrint Arch..

[5]  Lifeng Guo,et al.  Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security , 2012, Comput. Math. Appl..

[6]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[7]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[8]  Javier López,et al.  A Parametric Family of Attack Models for Proxy Re-encryption , 2015, 2015 IEEE 28th Computer Security Foundations Symposium.

[9]  Yevgeniy Dodis,et al.  Proxy Cryptography Revisited , 2003, NDSS.

[10]  Xiaoyuan Yang,et al.  Identity based broadcast encryption based on one to many identity based proxy re-encryption , 2009, 2009 2nd IEEE International Conference on Computer Science and Information Technology.

[11]  Eiji Okamoto,et al.  New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks , 2010, Pairing.

[12]  Xu An Wang,et al.  How to Solve Key Escrow Problem in Proxy Re-encryption from CBE to IBE , 2009, 2009 First International Workshop on Database Technology and Applications.

[13]  Benoît Libert,et al.  Tracing Malicious Proxies in Proxy Re-encryption , 2008, Pairing.

[14]  Xinwen Zhang,et al.  CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud , 2012, ASIACCS '12.

[15]  Ran Canetti,et al.  Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.

[16]  Toshihiko Matsuo,et al.  Proxy Re-encryption Systems for Identity-Based Encryption , 2007, Pairing.

[17]  Jun Ao,et al.  Group-Based Proxy Re-encryption Scheme , 2009, ICIC.

[18]  Jing Xu,et al.  Non-Transferable Proxy Re-Encryption , 2018, IACR Cryptol. ePrint Arch..

[19]  Feng-Hao Liu,et al.  Various Proxy Re-Encryption Schemes from Lattices , 2016, IACR Cryptol. ePrint Arch..