Certificate-Based Conditional Proxy Re-Encryption

A proxy re-encryption scheme (PRE) allows a semi-trusted proxy to convert a ciphertext encrypted under one key into an encryption of the same plaintext under another key. In the process of the arithmetic processing, proxy should be able to learn as little information about the plaintext as possible. Conditional proxy re-encryption (CPRE) is a primitive which only those ciphertexts satisfying one condition set by the delegator can be re-encrypted correctly by the proxy. In this paper, we combine the conditional proxy re-encryption with certificate-based encryption and propose a certificate-based conditional proxy re-encryption scheme. The proposed scheme is proved secure against chosen-ciphertext security (CCA) in the random oracle model.

[1]  Robert H. Deng,et al.  Conditional proxy re-encryption secure against chosen-ciphertext attack , 2009, ASIACCS '09.

[2]  Benoît Libert,et al.  Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption , 2008, Public Key Cryptography.

[3]  Xinyi Huang,et al.  Certificate-based signcryption with enhanced security features , 2012, Comput. Math. Appl..

[4]  Vincent Rijmen,et al.  Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings , 2008, INDOCRYPT.

[5]  Susan Hohenberger,et al.  Key-Private Proxy Re-encryption , 2009, CT-RSA.

[6]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[7]  Sang-Uk Shin,et al.  Certificate-Based Proxy Re-encryption for Public Cloud Storage , 2013, 2013 Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.

[8]  Stanislaw Jarecki,et al.  Public Key Cryptography – PKC 2009 , 2009, Lecture Notes in Computer Science.

[9]  Marc Fischlin,et al.  Topics in Cryptology – CT-RSA 2009 , 2009 .

[10]  Aggelos Kiayias,et al.  Traceable Signatures , 2004, EUROCRYPT.

[11]  Qiang Tang,et al.  Type-Based Proxy Re-encryption and Its Construction , 2008, INDOCRYPT.

[12]  Yang Lu,et al.  Forward-Secure Certificate-Based Encryption , 2009, 2009 Fifth International Conference on Information Assurance and Security.

[13]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[14]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..

[15]  Yi Mu,et al.  Constructions of certificate-based signature secure against key replacement attacks , 2010, J. Comput. Secur..

[16]  Aggelos Kiayias,et al.  Self Protecting Pirates and Black-Box Traitor Tracing , 2001, CRYPTO.

[17]  Wen-Guey Tzeng,et al.  Identity-Based Proxy Re-encryption Without Random Oracles , 2007, ISC.

[18]  Yi Mu,et al.  Certificate-Based Signature: Security Model and Efficient Construction , 2007, EuroPKI.

[19]  Yang Lu,et al.  Forward-Secure Certificate-Based Encryption and its Generic Construction , 2010, J. Networks.

[20]  Zhiwei Wang,et al.  Provably secure certificate-based signature scheme without pairings , 2013, Inf. Sci..

[21]  Ran Canetti,et al.  Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.

[22]  Natarajan Meghanathan,et al.  Advances in Network Security and Applications , 2011 .

[23]  Matthew K. Franklin,et al.  Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.

[24]  Ronald Cramer,et al.  Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings , 2008, Public Key Cryptography.

[25]  Willy Susilo,et al.  Anonymous Conditional Proxy Re-encryption without Random Oracle , 2009, ProvSec.

[26]  C. Pandu Rangan,et al.  Conditional Proxy Re-Encryption - A More Efficient Construction , 2011 .

[27]  Kaisa Nyberg,et al.  Advances in Cryptology — EUROCRYPT'98 , 1998 .

[28]  Matthew Green,et al.  Identity-Based Proxy Re-encryption , 2007, ACNS.

[29]  Zhenfu Cao,et al.  CCA-Secure Proxy Re-Encryption without Pairings , 2009, IACR Cryptol. ePrint Arch..

[30]  Craig Gentry,et al.  Certificate-Based Encryption and the Certificate Revocation Problem , 2003, EUROCRYPT.

[31]  Lizhong Xu,et al.  An efficient short certificate-based signature scheme , 2012, J. Syst. Softw..

[32]  Yuan Zhou,et al.  Achieving key privacy without losing CCA security in proxy re-encryption , 2012, J. Syst. Softw..