A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing

Blaze, Bleumer and Strauss introduced the notion of proxy re-encryption (PRE), which enables a semi-trusted proxy to transform ciphertexts under Alice’s public key into ciphertexts under Bob’s public key. The important property to note here is, the proxy should not learn anything about the plaintext encrypted. In 2009, Weng et al. introduced the concept of conditional proxy re-encryption (CPRE), which permits the proxy to re-encrypt only ciphertexts satisfying a condition specified by Alice into a ciphertext for Bob. CPRE enables fine-grained delegation of decryption rights useful in many practical scenarios, such as blockchain-enabled distributed cloud storage and encrypted email forwarding. Several CPRE schemes exist in the literature based on costly bilinear pairing operation in the random oracle model. We propose the first construction of an efficient CPRE scheme without pairing, satisfying chosen ciphertext security under the computational Diffie Hellman (CDH) assumption and its variant in the random oracle model.

[1]  Matthew Green,et al.  Improved proxy re-encryption schemes with applications to secure distributed storage , 2006, TSEC.

[2]  Xiaohui Liang,et al.  Attribute based proxy re-encryption with delegating capabilities , 2009, ASIACCS '09.

[3]  Claus-Peter Schnorr,et al.  Efficient signature generation by smart cards , 2004, Journal of Cryptology.

[4]  Jonathan Katz,et al.  Chosen-Ciphertext Security from Identity-Based Encryption , 2004, SIAM J. Comput..

[5]  Robert H. Deng,et al.  On the security of two identity-based conditional proxy re-encryption schemes , 2016, Theor. Comput. Sci..

[6]  Jiguo Li,et al.  Provably Secure Certificate-based Conditional Proxy Re-encryption , 2016, J. Inf. Sci. Eng..

[7]  C. Pandu Rangan,et al.  EFFICIENT CONDITIONAL PROXY RE- ENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY , 2012 .

[8]  Robert H. Deng,et al.  Conditional Proxy Broadcast Re-Encryption , 2009, ACISP.

[9]  Matt Blaze,et al.  Divertible Protocols and Atomic Proxy Cryptography , 1998, EUROCRYPT.

[10]  Willy Susilo,et al.  Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search , 2012, Theor. Comput. Sci..

[11]  Qiang Tang,et al.  Type-Based Proxy Re-encryption and Its Construction , 2008, INDOCRYPT.

[12]  Willy Susilo,et al.  Hierarchical conditional proxy re-encryption , 2012, Comput. Stand. Interfaces.

[13]  Jean-Sébastien Coron,et al.  On the Exact Security of Full Domain Hash , 2000, CRYPTO.

[14]  Paulo S. L. M. Barreto,et al.  Efficient Algorithms for Pairing-Based Cryptosystems , 2002, CRYPTO.

[15]  Robert H. Deng,et al.  Conditional proxy re-encryption secure against chosen-ciphertext attack , 2009, ASIACCS '09.

[16]  Jiguo Li,et al.  Certificate-Based Conditional Proxy Re-Encryption , 2015, NSS.

[17]  Willy Susilo,et al.  Anonymous Conditional Proxy Re-encryption without Random Oracle , 2009, ProvSec.

[18]  C. Pandu Rangan,et al.  Conditional Proxy Re-Encryption - A More Efficient Construction , 2011 .

[19]  Yongjun Ren,et al.  A CCA-secure multi-conditional proxy broadcast re-encryption scheme for cloud storage system , 2019, J. Inf. Secur. Appl..

[20]  C. Pandu Rangan,et al.  Certificateless Proxy Re-Encryption Without Pairing: Revisited , 2015, SCC@ASIACCS.

[21]  Yixian Yang,et al.  PRECISE: Identity-based private data sharing with conditional proxy re-encryption in online social networks , 2017, Future Gener. Comput. Syst..

[22]  Hoonjae Lee,et al.  Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security , 2009, 2014 Ninth Asia Joint Conference on Information Security.

[23]  Robert H. Deng,et al.  Efficient Unidirectional Proxy Re-Encryption , 2010, AFRICACRYPT.

[24]  Cong Wang,et al.  Attribute based data sharing with attribute revocation , 2010, ASIACCS '10.

[25]  Ran Canetti,et al.  Chosen-ciphertext secure proxy re-encryption , 2007, CCS '07.

[26]  Benoît Libert,et al.  Tracing Malicious Proxies in Proxy Re-encryption , 2008, Pairing.

[27]  Yun Ling,et al.  Identity-Based Conditional Proxy Re-Encryption , 2011, 2011 IEEE International Conference on Communications (ICC).

[28]  Joseph K. Liu,et al.  Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption , 2015, Comput. J..

[29]  Zhen Liu,et al.  A CCA-Secure Identity-Based Conditional Proxy Re-Encryption without Random Oracles , 2012, ICISC.

[30]  Donghyun Kim,et al.  Conditional proxy re-encryption for secure big data group sharing in cloud environment , 2014, 2014 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS).