Skip to main content

2018 | OriginalPaper | Buchkapitel

A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme

verfasst von : Arinjita Paul, Varshika Srinivasavaradhan, S. Sharmila Deva Selvi, C. Pandu Rangan

Erschienen in: Provable Security

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Cloud storage enables its users to store confidential information as encrypted files in the cloud. A cloud user (say Alice) can share her encrypted files with another user (say Bob) by availing proxy re-encryption services of the cloud. Proxy Re-Encryption (PRE) is a cryptographic primitive that allows transformation of ciphertexts from Alice to Bob via a semi-trusted proxy, who should not learn anything about the shared message. Typically, the re-encryption rights are enabled only for a bounded, fixed time and malicious parties may want to decrypt or learn messages encrypted for Alice, even beyond that time. The basic security notion of PRE assumes the proxy (cloud) is semi-trusted, which is seemingly insufficient in practical applications. The proxy may want to collude with Bob to obtain the private keys of Alice for later use. Such an attack is called collusion attack, allowing colluders to illegally access all encrypted information of Alice in the cloud. Hence, achieving collusion resistance is indispensable to real-world scenarios. Realizing collusion-resistant PRE has been an interesting problem in the ID-based setting. To this end, several attempts have been made to construct a collusion-resistant IB-PRE scheme and we discuss their properties and weaknesses in this paper. We also present a new collusion-resistant IB-PRE scheme that meets the adaptive CCA security under the decisional bilinear Diffie-Hellman hardness assumption in the random oracle model.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS (2005) Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS (2005)
2.
Zurück zum Zitat Ateniese, G., Kevin, F., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 9(1), 1–30 (2006)CrossRef Ateniese, G., Kevin, F., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 9(1), 1–30 (2006)CrossRef
5.
Zurück zum Zitat Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptol. 17(4), 297–319 (2004)MathSciNetCrossRef Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptol. 17(4), 297–319 (2004)MathSciNetCrossRef
6.
Zurück zum Zitat Chow, S.S.M., Weng, J., Yang, Y., Deng, R.H.: Efficient unidirectional proxy re-encryption. IACR Cryptology ePrint Archive, 2009:189 (2009) Chow, S.S.M., Weng, J., Yang, Y., Deng, R.H.: Efficient unidirectional proxy re-encryption. IACR Cryptology ePrint Archive, 2009:189 (2009)
9.
Zurück zum Zitat Han, J., Susilo, W., Mu, Y.: Identity-based data storage in cloud computing. Future Gener. Comput. Syst. 29(3), 673–681 (2013)CrossRef Han, J., Susilo, W., Mu, Y.: Identity-based data storage in cloud computing. Future Gener. Comput. Syst. 29(3), 673–681 (2013)CrossRef
10.
Zurück zum Zitat Koo, W.K., Hwang, J.Y., Lee, D.H.: Security vulnerability in a non-interactive id-based proxy re-encryption scheme. Inf. Process. Lett. 109(23), 1260–1262 (2009)MathSciNetCrossRef Koo, W.K., Hwang, J.Y., Lee, D.H.: Security vulnerability in a non-interactive id-based proxy re-encryption scheme. Inf. Process. Lett. 109(23), 1260–1262 (2009)MathSciNetCrossRef
12.
Zurück zum Zitat Qiu, J., Jo, J., Lee, H.: Collusion-resistant identity-based proxy re-encryption without random oracles. Int. J. Secur. Appl. 9(9), 337–344 (2015) Qiu, J., Jo, J., Lee, H.: Collusion-resistant identity-based proxy re-encryption without random oracles. Int. J. Secur. Appl. 9(9), 337–344 (2015)
13.
Zurück zum Zitat Shao, J., Cao, Z., Liu, P.: SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. Secur. Commun. Netw. 4(2), 122–135 (2011)CrossRef Shao, J., Cao, Z., Liu, P.: SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption. Secur. Commun. Netw. 4(2), 122–135 (2011)CrossRef
14.
Zurück zum Zitat Srinivasavaradhan, V., Paul, A., Sharmila Deva Selvi, S., Pandu Rangan, C.: A CCA-secure collusion-resistant identity-based proxy re-encryption scheme (full version). Cryptology ePrint Archive, August 2018 Srinivasavaradhan, V., Paul, A., Sharmila Deva Selvi, S., Pandu Rangan, C.: A CCA-secure collusion-resistant identity-based proxy re-encryption scheme (full version). Cryptology ePrint Archive, August 2018
16.
Zurück zum Zitat Sree Vivek, S., Sharmila Deva Selvi, S., Radhakishan, V., Pandu Rangan, C.: Efficient conditional proxy re-encryption with chosen ciphertext security. Int. J. Netw. Secur. Appl. 4(2), 179 (2012)MATH Sree Vivek, S., Sharmila Deva Selvi, S., Radhakishan, V., Pandu Rangan, C.: Efficient conditional proxy re-encryption with chosen ciphertext security. Int. J. Netw. Secur. Appl. 4(2), 179 (2012)MATH
17.
Zurück zum Zitat Wang, H., Zeng, P., Choo, K.-K.R.: MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption. Securi. Commun. Netw. 7(11), 1641–1651 (2014)CrossRef Wang, H., Zeng, P., Choo, K.-K.R.: MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption. Securi. Commun. Netw. 7(11), 1641–1651 (2014)CrossRef
19.
Zurück zum Zitat Wang, X.A., Zhong, W.: A new identity based proxy re-encryption scheme. In: 2010 International Conference on Biomedical Engineering and Computer Science, pp. 1–4, April 2010 Wang, X.A., Zhong, W.: A new identity based proxy re-encryption scheme. In: 2010 International Conference on Biomedical Engineering and Computer Science, pp. 1–4, April 2010
20.
Zurück zum Zitat Zhang, L., Ma, H., Liu, Z., Dong, E.: Security analysis and improvement of a collusion-resistant identity-based proxy re-encryption scheme. In: Barolli, L., Xhafa, F., Yim, K. (eds.) Advances on Broad-Band Wireless Computing, Communication and Applications. LNDECT, vol. 2, pp. 839–846. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-49106-6_86CrossRef Zhang, L., Ma, H., Liu, Z., Dong, E.: Security analysis and improvement of a collusion-resistant identity-based proxy re-encryption scheme. In: Barolli, L., Xhafa, F., Yim, K. (eds.) Advances on Broad-Band Wireless Computing, Communication and Applications. LNDECT, vol. 2, pp. 839–846. Springer, Cham (2017). https://​doi.​org/​10.​1007/​978-3-319-49106-6_​86CrossRef
Metadaten
Titel
A CCA-Secure Collusion-Resistant Identity-Based Proxy Re-Encryption Scheme
verfasst von
Arinjita Paul
Varshika Srinivasavaradhan
S. Sharmila Deva Selvi
C. Pandu Rangan
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-030-01446-9_7