Revisit of Group-based Unidirectional Proxy Re-encryption Scheme

Currently, researchers have focused their attention on proxy re-encryption scheme deployed between two entities. Lots of bidirectional schemes have been proposed and this kind of scheme is suitable for the scenario in which the two entities have already established a relationship of trust. How to construct a unidirectional scheme is an open problem and receiving increasing attention. In this paper, we present a unidirectional proxy re-encryption scheme for group communication. In this scheme, a proxy is only allowed to convert ciphertext for Alice into ciphertext for Bob without revealing any information on plaintext or private key. It is suitable for the environment in which no mutual relationship exists and transitivity is not permitted. We prove the scheme secure against chosen ciphertext attack in standard model.

[1]  Jonathan Katz,et al.  Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..

[2]  Silvio Micali,et al.  Probabilistic Encryption , 1984, J. Comput. Syst. Sci..

[3]  M. Mambo,et al.  Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security) , 1997 .

[4]  Matthew Green,et al.  Identity-Based Proxy Re-encryption , 2007, ACNS.

[5]  Yevgeniy Dodis,et al.  Proxy Cryptography Revisited , 2003, NDSS.

[6]  Michael K. Reiter,et al.  Two-party generation of DSA signatures , 2001, International Journal of Information Security.

[7]  Markus Jakobsson,et al.  On Quorum Controlled Asymmetric Proxy Re-encryption , 1999, Public Key Cryptography.

[8]  Jun Ao,et al.  Group-oriented Encryption Secure against Collude Attack , 2008, J. Convergence Inf. Technol..

[9]  Kwangjo Kim,et al.  Computing with secrets for mobile agent using one-time proxy signature , 2001 .

[10]  Yevgeniy Dodis,et al.  Proxy cryptography revisted , 2003 .

[11]  Ran Canetti,et al.  Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.

[12]  Hovav Shacham,et al.  Short Signatures from the Weil Pairing , 2001, J. Cryptol..

[13]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[14]  Michael K. Reiter,et al.  Two-party generation of DSA signatures , 2004, International Journal of Information Security.

[15]  Ethan L. Miller,et al.  Design for a Decentralized Security System For Network Attached Storage , 2000, IEEE Symposium on Mass Storage Systems.

[16]  Matt Blaze,et al.  A cryptographic file system for UNIX , 1993, CCS '93.

[17]  Thomas Phan,et al.  Challenge: integrating mobile wireless devices into the computational grid , 2002, MobiCom '02.

[18]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[19]  Daniel R. Simon,et al.  Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.

[20]  Jianhua Li,et al.  Broadcast Group-oriented Encryption in Group Communication , 2006, 2006 International Conference on Communications, Circuits and Systems.

[21]  Dan Boneh,et al.  Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles , 2004, IACR Cryptol. ePrint Arch..