Skip to main content
Erschienen in: Mobile Networks and Applications 2/2017

25.07.2016

Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme

verfasst von: Yuxia Sun, Dan Liu

Erschienen in: Mobile Networks and Applications | Ausgabe 2/2017

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Condition proxy re-encryption is a promising security primitive for pervasive data sharing in such settings as cloud-based social networks and collaborations. However, it is challenging to create a secure condition proxy re-encryption scheme that is applicable for circumstances with multiple conditions. Based on secret sharing, Lan et al. proposed a conditional proxy re-encryption scheme that can support “AND” and “OR” gates over multiple conditions, and claimed that the scheme is secure against Chosen-Ciphertext Attack (CCA) in the random oracle model. However, by giving two concrete attacks, we show that their scheme is not CCA secure and even not secure against Chosen-Plaintext Attack (CPA) under their defined security model. Furthermore, we analyze why the scheme cannot satisfy the security mentioned above.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Blaze M, Bleumer G, Strauss M (1998) Divertible Protocols and Atomic Proxy Cryptography. In: Proceedings of the Cryptology-Eurocrypt’98. LNCS, Springer, Heidelberg, 1403: pp 127–144 Blaze M, Bleumer G, Strauss M (1998) Divertible Protocols and Atomic Proxy Cryptography. In: Proceedings of the Cryptology-Eurocrypt’98. LNCS, Springer, Heidelberg, 1403: pp 127–144
2.
Zurück zum Zitat Ateniese G, Fu K, Green M, Hohenberger S (2005) Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. In Proceedings of NDSS 2005, pp 29–43 Ateniese G, Fu K, Green M, Hohenberger S (2005) Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. In Proceedings of NDSS 2005, pp 29–43
3.
Zurück zum Zitat Jahid S, Mittal P, Borisov N (2011). EASiER: Encryption-based access control in social networks with efficient revocation. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ACM, pp 411–415 Jahid S, Mittal P, Borisov N (2011). EASiER: Encryption-based access control in social networks with efficient revocation. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ACM, pp 411–415
4.
Zurück zum Zitat Xu P, Jiao T, Wu Q, Wang W, Jin H (2016) Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email. IEEE Trans Comput (1): 66–79 Xu P, Jiao T, Wu Q, Wang W, Jin H (2016) Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email. IEEE Trans Comput (1): 66–79
5.
Zurück zum Zitat Huang QL, Ma ZF, JY F, Niu XX (2013) Authorization protocol of multimedia digital rights management based on proxy re-encryption. Journal of Beijing University of Posts and Telecommunications 36(6):7–12 Huang QL, Ma ZF, JY F, Niu XX (2013) Authorization protocol of multimedia digital rights management based on proxy re-encryption. Journal of Beijing University of Posts and Telecommunications 36(6):7–12
6.
Zurück zum Zitat Weng J, Deng RH, Ding X, Chu CK, Lai, J (2009) Conditional Proxy Reencryption Secure Against Chosen-Ciphertext Attack. In: Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), pp 322–332 Weng J, Deng RH, Ding X, Chu CK, Lai, J (2009) Conditional Proxy Reencryption Secure Against Chosen-Ciphertext Attack. In: Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), pp 322–332
7.
Zurück zum Zitat Fang L, Susilo W, Wang J (2009) Anonymous conditional proxy re-encryption without random oracle. In: Proceedings of Provable Security 2009, pp 47–60 Fang L, Susilo W, Wang J (2009) Anonymous conditional proxy re-encryption without random oracle. In: Proceedings of Provable Security 2009, pp 47–60
8.
Zurück zum Zitat Weng J, Yang Y, Tang Q, Deng RH, Bao F (2009) Efficient conditional proxy re-encryption with chosen-ciphertext security. In: Proceedings of the 12th Information Security Conference (ISC’09), 5735: pp 151–166 Weng J, Yang Y, Tang Q, Deng RH, Bao F (2009) Efficient conditional proxy re-encryption with chosen-ciphertext security. In: Proceedings of the 12th Information Security Conference (ISC’09), 5735: pp 151–166
9.
Zurück zum Zitat Chu CK, Weng J, Chow SSM, Zhou J, Deng RH (2009) Conditional proxy broadcast re-encryption. In: Proceedings of the 14th Australasian Conference on Information Security and Privacy (ACISP’09), 5594: pp 327–342 Chu CK, Weng J, Chow SSM, Zhou J, Deng RH (2009) Conditional proxy broadcast re-encryption. In: Proceedings of the 14th Australasian Conference on Information Security and Privacy (ACISP’09), 5594: pp 327–342
11.
Zurück zum Zitat Zhao, J, Feng, D, Zhang Z (2010) Attribute-Based Conditional Proxy Re-Encryption with Chosen-Ciphertext Security. In: Proceedings of GLOBECOM, pp 1–6. Zhao, J, Feng, D, Zhang Z (2010) Attribute-Based Conditional Proxy Re-Encryption with Chosen-Ciphertext Security. In: Proceedings of GLOBECOM, pp 1–6.
12.
Zurück zum Zitat Yang Y, Lu H, Weng J, et al. (2014) Fine-grained conditional proxy re-encryption and application. Provable Security:206–222 Yang Y, Lu H, Weng J, et al. (2014) Fine-grained conditional proxy re-encryption and application. Provable Security:206–222
13.
Zurück zum Zitat Zhang X, Chen MR (2009) On the Security of a Conditional Proxy Re-Encryption. IEICE Trans Fundam Electron Commun Comput Sci 92(10):2644–2647CrossRef Zhang X, Chen MR (2009) On the Security of a Conditional Proxy Re-Encryption. IEICE Trans Fundam Electron Commun Comput Sci 92(10):2644–2647CrossRef
14.
Zurück zum Zitat Lan CH, Wang CF (2013). A new conditional proxy re-encryption scheme based on secret sharing. Journal of computer 36(4): 895–902 (in Chinese) Lan CH, Wang CF (2013). A new conditional proxy re-encryption scheme based on secret sharing. Journal of computer 36(4): 895–902 (in Chinese)
16.
Zurück zum Zitat Isshiki T, Nguyen MH, Tanaka K (2013) Proxy re-encryption in a stronger security model extended from CT-RSA2012. Topics in Cryptology-CT-RSA, Springer Berlin Heidelberg: 277–292 Isshiki T, Nguyen MH, Tanaka K (2013) Proxy re-encryption in a stronger security model extended from CT-RSA2012. Topics in Cryptology-CT-RSA, Springer Berlin Heidelberg: 277–292
Metadaten
Titel
Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme
verfasst von
Yuxia Sun
Dan Liu
Publikationsdatum
25.07.2016
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 2/2017
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-016-0760-2

Weitere Artikel der Ausgabe 2/2017

Mobile Networks and Applications 2/2017 Zur Ausgabe

Neuer Inhalt