Skip to main content
Top

2018 | OriginalPaper | Chapter

Secure Non-transferable Proxy Re-encryption for Group Membership and Non-membership

Authors : Ei Mon Cho, Lwin San, Takeshi Koshiba

Published in: Advances in Network-Based Information Systems

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In proxy re-encrytpion (PRE) scheme, the message is sent by a delegator to a delegatee with a help of the trusted third party proxy without knowing the existing plaintext. PRE schemes are widely used in various applications. However, the standard PRE scheme has some proxy problems called private key generator (PKG) despotism problem. This means that PKG can make re-encryption key without permission from delegator. And also, if someone can attack PKG in a PRE scheme, they can decrypt both the original ciphertext and the re-encrypted ciphertext which means the key-escrow problem. A solution for these two problems is to use non-transferable PRE scheme. Non-transferable PRE scheme solved the above PKG despotism problem and key-escrow problem. We would like to introduce our PRE scheme with a new approach. In our scheme, there are three sub-processes, which are based on a non-transferable PRE scheme and group signature. Our scheme will provide the security for delegator i, delegatee j (who is in the same group with delegator i), and delegatee k (who is in a different group with delegator i).

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144 (1998) Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: EUROCRYPT 1998. LNCS, vol. 1403, pp. 127–144 (1998)
2.
go back to reference Libert, B., Vergnaud, D.: Tracing malicious proxies in proxy re-encryption. In: Pairing-Based Cryptography-Pairing 2008, pp. 332–353. Springer (2008) Libert, B., Vergnaud, D.: Tracing malicious proxies in proxy re-encryption. In: Pairing-Based Cryptography-Pairing 2008, pp. 332–353. Springer (2008)
3.
go back to reference Wang, L., Wang, L., Mambo, M., Okamoto, E.: New identity- based proxy re-encryption schemes to prevent collusion attacks. In: Pairing 2010, pp. 327–346. Springer (2010) Wang, L., Wang, L., Mambo, M., Okamoto, E.: New identity- based proxy re-encryption schemes to prevent collusion attacks. In: Pairing 2010, pp. 327–346. Springer (2010)
4.
go back to reference Ma, C., Ao, J.: Group-based proxy re-encryption scheme. In: ICIC, 2009, pp. 1025–1034 (2009) Ma, C., Ao, J.: Group-based proxy re-encryption scheme. In: ICIC, 2009, pp. 1025–1034 (2009)
5.
go back to reference He, Y., Chim, T.W., Hui, L.C.K., Yiu, S.: Non-transferable proxy re-encryption scheme. In: NTMS 2012, pp. 1–4 (2012) He, Y., Chim, T.W., Hui, L.C.K., Yiu, S.: Non-transferable proxy re-encryption scheme. In: NTMS 2012, pp. 1–4 (2012)
6.
go back to reference Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with application to secure distributed storage. In: NDSS, pp. 29–43, February 2005 Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with application to secure distributed storage. In: NDSS, pp. 29–43, February 2005
7.
go back to reference Ivan, A., Dodis, Y.: Proxy cryptography revisited. In: NDSS, February 2003 Ivan, A., Dodis, Y.: Proxy cryptography revisited. In: NDSS, February 2003
8.
go back to reference Libert, B., Vergnaud, D.: Tracing malicious proxies in proxy re-encryption. In: Pairing, pp. 332–353, September 2008 Libert, B., Vergnaud, D.: Tracing malicious proxies in proxy re-encryption. In: Pairing, pp. 332–353, September 2008
9.
go back to reference Matsuo, T.: Proxy re-encryption systems for identity-based encryption. In: Pairing, pp. 247–267, July 2007 Matsuo, T.: Proxy re-encryption systems for identity-based encryption. In: Pairing, pp. 247–267, July 2007
10.
go back to reference Niu, K., Wang, X.A., Zhang, M.Q.: How to solve key escrow problem in proxy re-encryption from CBE to IBE. In: DBTA, pp. 95–98, April 2009 Niu, K., Wang, X.A., Zhang, M.Q.: How to solve key escrow problem in proxy re-encryption from CBE to IBE. In: DBTA, pp. 95–98, April 2009
11.
go back to reference Wang, X.A., Yang, X.Y.: Identity based broadcast encryption based on one to many identity based proxy re-encryption. In: IEEE, pp. 47–50, August 2009 Wang, X.A., Yang, X.Y.: Identity based broadcast encryption based on one to many identity based proxy re-encryption. In: IEEE, pp. 47–50, August 2009
12.
go back to reference Guo, H., Zhang, Z., Xu, J.: Non-transferable proxy re-encryption. In: IACR Cryptology, ePrint Archive 2015:1216 (2015) Guo, H., Zhang, Z., Xu, J.: Non-transferable proxy re-encryption. In: IACR Cryptology, ePrint Archive 2015:1216 (2015)
13.
go back to reference Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: ACM Conference on Computer and Communication Security, pp. 185–1946. ACM (2007) Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: ACM Conference on Computer and Communication Security, pp. 185–1946. ACM (2007)
14.
go back to reference Taban, G., Cardenas, A.A., Gligor, V.D.: Towards a secure and interoperable DRM architecture. In: ACM Workshop on Digital Right Management, pp. 69–78. ACM (2006) Taban, G., Cardenas, A.A., Gligor, V.D.: Towards a secure and interoperable DRM architecture. In: ACM Workshop on Digital Right Management, pp. 69–78. ACM (2006)
15.
go back to reference Xu, L., Wu, X., Zhang, X.: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: ASIACCS 2012, pp. 87–88 (2012) Xu, L., Wu, X., Zhang, X.: A certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: ASIACCS 2012, pp. 87–88 (2012)
16.
go back to reference Nuez, D., Agudo, I., Lopez, J.: A parametric family of attack models for proxy re-encryption. In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, pp. 290–301 (2015) Nuez, D., Agudo, I., Lopez, J.: A parametric family of attack models for proxy re-encryption. In: IEEE 28th Computer Security Foundations Symposium, CSF 2015, pp. 290–301 (2015)
17.
go back to reference Fan, X., Liu, F.: Various proxy re-encryption schemes from lattices. In: IACR Cryptology ePrint Archive 2016:278 (2016) Fan, X., Liu, F.: Various proxy re-encryption schemes from lattices. In: IACR Cryptology ePrint Archive 2016:278 (2016)
18.
go back to reference Phong, L., Wang, L., Aono, Y., Nguyen, M., Boyen, X.: Proxy re-encryption schemes with key privacy from LWE. In: IACR Cryptology ePrint Archive 2016:327 (2016) Phong, L., Wang, L., Aono, Y., Nguyen, M., Boyen, X.: Proxy re-encryption schemes with key privacy from LWE. In: IACR Cryptology ePrint Archive 2016:327 (2016)
19.
go back to reference Guo, L., Hu, L.: Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security. Comput. Math. Appl. 63(1), 151–157 (2012)MathSciNetCrossRefMATH Guo, L., Hu, L.: Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security. Comput. Math. Appl. 63(1), 151–157 (2012)MathSciNetCrossRefMATH
Metadata
Title
Secure Non-transferable Proxy Re-encryption for Group Membership and Non-membership
Authors
Ei Mon Cho
Lwin San
Takeshi Koshiba
Copyright Year
2018
DOI
https://doi.org/10.1007/978-3-319-65521-5_79

Premium Partner