Skip to main content

2019 | OriginalPaper | Buchkapitel

On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Scheme

verfasst von : Xu An Wang, Arun Kumar Sangaiah, Nadia Nedjah, Chun Shan, Zuliang Wang

Erschienen in: Advances on P2P, Parallel, Grid, Cloud and Internet Computing

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Proxy re-encryption acts an important role in secure data sharing in cloud storage. There are many variants of proxy re-encryption until now, in this paper we focus on the timed-realise conditional proxy broadcast re-encryption. In this primitive, if and only the condition and time satisfied the requirement, the proxy can re-encrypt the delegator(broadcast encryption set)’s ciphertext to be the delegatee(another broadcast encryption set)’s ciphertext. Chosen cipertext security (CCA-security) is an important security notion for encryption scheme. In the security model of CCA-security, the adversary can query the decryption oracle to get help, with the only restriction the challenge ciphertext can not be queried to the decryption oracle. For CCA-security of time-realised conditional proxy broadcast re-encryption, the situation is more complicated for this time the adversary can not only get the decryption oracle of normal ciphertext but also the decryption oracle of the re-encrypted ciphertext and the re-encrypted key generation oracle. In 2013, Liang et al. proposed a CCA-secure time-realised conditional proxy broadcast re-encryption scheme, in this paper, we show their proposal is not CCA-secure in the security model of CCA-secure time-realised conditional proxy broadcast re-encryption.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT’98. Volume 1403 of LNCS, pp. 127–144, Espoo, Finland, May 31–June 4, 1998. Springer, Berlin Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT’98. Volume 1403 of LNCS, pp. 127–144, Espoo, Finland, May 31–June 4, 1998. Springer, Berlin
2.
Zurück zum Zitat Ivan, A., Dodis, Y.: Proxy cryptography revisited. In: NDSS 2003, San Diego, California, USA, February 5–7, 2003. The Internet Society Ivan, A., Dodis, Y.: Proxy cryptography revisited. In: NDSS 2003, San Diego, California, USA, February 5–7, 2003. The Internet Society
3.
Zurück zum Zitat Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS 2005, San Diego, California, USA, February 3–4, 2005. The Internet Society Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS 2005, San Diego, California, USA, February 3–4, 2005. The Internet Society
4.
Zurück zum Zitat Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)CrossRef Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)CrossRef
5.
Zurück zum Zitat Chiu, Y.-P., Lei, C.-L., Huang, C.-Y.: Secure multicast using proxy encryption. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 05. Volume 3783 of LNCS, pp. 280–290, Beijing, China, December 10–13, 2005. Springer, Berlin, Germany (2005)CrossRef Chiu, Y.-P., Lei, C.-L., Huang, C.-Y.: Secure multicast using proxy encryption. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 05. Volume 3783 of LNCS, pp. 280–290, Beijing, China, December 10–13, 2005. Springer, Berlin, Germany (2005)CrossRef
6.
Zurück zum Zitat Chu, C., Chow, S., Weng, J., Zhou, J., Deng, R.H.: Conditional proxy broadcast re-encryption. In: ACISP 2009. Volume 5594 of LNCS, pp. 327–342 (2009)CrossRef Chu, C., Chow, S., Weng, J., Zhou, J., Deng, R.H.: Conditional proxy broadcast re-encryption. In: ACISP 2009. Volume 5594 of LNCS, pp. 327–342 (2009)CrossRef
7.
Zurück zum Zitat Shao, J., Liu, P., Wei, G., Ling, Y.: Anonymous proxy re-encryption. Secur. Commun. Netw. 5(5), 439–449 (2012)CrossRef Shao, J., Liu, P., Wei, G., Ling, Y.: Anonymous proxy re-encryption. Secur. Commun. Netw. 5(5), 439–449 (2012)CrossRef
8.
Zurück zum Zitat Liang, K., Au, M.H., Liu, J.K., Qi, X., Susilo, W., Tran, X.P., Wong, D.S., Yang, G.: A dfa-based functional proxy re-encryption scheme for secure public cloud data sharing. IEEE Trans. Inf. Forensics Secur. 9(10), 1667–1680 (2014)CrossRef Liang, K., Au, M.H., Liu, J.K., Qi, X., Susilo, W., Tran, X.P., Wong, D.S., Yang, G.: A dfa-based functional proxy re-encryption scheme for secure public cloud data sharing. IEEE Trans. Inf. Forensics Secur. 9(10), 1667–1680 (2014)CrossRef
9.
Zurück zum Zitat Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Kutylowski, M., Vaidya, J. (eds.) ESORICS 2014, Part I. Volume 8712 of LNCS, pp. 257–272, Wroclaw, Poland, September 7–11, 2014. Springer, Berlin, Germany Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Kutylowski, M., Vaidya, J. (eds.) ESORICS 2014, Part I. Volume 8712 of LNCS, pp. 257–272, Wroclaw, Poland, September 7–11, 2014. Springer, Berlin, Germany
10.
Zurück zum Zitat Wang, Ying, Jiali, Du, Cheng, Xiaochun, Liu, Zheli, Lin, Kai: Degradation and encryption for outsourced PNG images in cloud storage. Int. J. Grid Util. Comput. 7(1), 22–28 (2016)CrossRef Wang, Ying, Jiali, Du, Cheng, Xiaochun, Liu, Zheli, Lin, Kai: Degradation and encryption for outsourced PNG images in cloud storage. Int. J. Grid Util. Comput. 7(1), 22–28 (2016)CrossRef
11.
Zurück zum Zitat Zhu, Shuaishuai, Yang, Xiaoyuan: Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6(2), 91–97 (2015)CrossRef Zhu, Shuaishuai, Yang, Xiaoyuan: Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6(2), 91–97 (2015)CrossRef
12.
Zurück zum Zitat Guo, Shu, Haixia, Xu: A secure delegation scheme of large polynomial computation in multi-party cloud. Int. J. Grid Util. Comput. 6(2), 1–7 (2015) Guo, Shu, Haixia, Xu: A secure delegation scheme of large polynomial computation in multi-party cloud. Int. J. Grid Util. Comput. 6(2), 1–7 (2015)
13.
Zurück zum Zitat Dutu, Cristina, Apostol, Elena, Leordeanu, Catalin, Cristea, Valentin: A solution for the management of multimedia sessions in hybrid clouds. Int. J. Space-Based Situated Comput. 4(2), 77–87 (2014)CrossRef Dutu, Cristina, Apostol, Elena, Leordeanu, Catalin, Cristea, Valentin: A solution for the management of multimedia sessions in hybrid clouds. Int. J. Space-Based Situated Comput. 4(2), 77–87 (2014)CrossRef
14.
Zurück zum Zitat Thabet, Meriem, Boufaida, Mahmoud, Kordon, Fabrice: An approach for developing an interoperability mechanism between cloud providers. Int. J. Space-Based Situated Comput. 4(2), 88–99 (2014)CrossRef Thabet, Meriem, Boufaida, Mahmoud, Kordon, Fabrice: An approach for developing an interoperability mechanism between cloud providers. Int. J. Space-Based Situated Comput. 4(2), 88–99 (2014)CrossRef
15.
Zurück zum Zitat Wang, L., Wang, L., Mambo,M., Okamoto, E.: Identity-based proxy cryptosystems with revocability and hierarchical confidentialities. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 10. Volume 6476 of LNCS, pp. 383–400, Barcelona, Spain, December 15–17, 2010. Springer, Berlin, GermanyCrossRef Wang, L., Wang, L., Mambo,M., Okamoto, E.: Identity-based proxy cryptosystems with revocability and hierarchical confidentialities. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 10. Volume 6476 of LNCS, pp. 383–400, Barcelona, Spain, December 15–17, 2010. Springer, Berlin, GermanyCrossRef
16.
Zurück zum Zitat Liang, K., Huang, Q., Schlegel, R., Wong, D.S., Tang, C.: A conditional proxy broadcast re-encryption scheme supporting timed-release. In: ISPEC 2013. LNCS, vol. 7863, pp. 132–146. Springer, Heidelberg (2013)CrossRef Liang, K., Huang, Q., Schlegel, R., Wong, D.S., Tang, C.: A conditional proxy broadcast re-encryption scheme supporting timed-release. In: ISPEC 2013. LNCS, vol. 7863, pp. 132–146. Springer, Heidelberg (2013)CrossRef
17.
Zurück zum Zitat X. Wang, X. Yang, F. Li. On the Role of PKG for Proxy Re-encryption in the Identity Based Setting. Available at Cryptology ePrint Archive, Report 2008/410, 2008 X. Wang, X. Yang, F. Li. On the Role of PKG for Proxy Re-encryption in the Identity Based Setting. Available at Cryptology ePrint Archive, Report 2008/410, 2008
18.
Zurück zum Zitat Weng, J., Deng, R.H., Chu, C., Ding, X., Lai, J.: Conditional proxy re-encryption secure against chosen-ciphertext attack. ACM ASIACCS 2009, 322–332 (2009) Weng, J., Deng, R.H., Chu, C., Ding, X., Lai, J.: Conditional proxy re-encryption secure against chosen-ciphertext attack. ACM ASIACCS 2009, 322–332 (2009)
19.
Zurück zum Zitat Weng, J., Yang, Y., Tang, Q., Deng, R., Bao, F.: Efficient conditional proxy re-encryption with chosen-ciphertext security. In: ISC 2009. Volume 5735 of LNCS, pp. 151–166 (2008) Weng, J., Yang, Y., Tang, Q., Deng, R., Bao, F.: Efficient conditional proxy re-encryption with chosen-ciphertext security. In: ISC 2009. Volume 5735 of LNCS, pp. 151–166 (2008)
20.
Zurück zum Zitat Weng, J., Chen, M., Yang, Y., Deng, R., Chen, K., Bao, F.: CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. China Inf. Sci. 53, 593–606 (2010)MathSciNetCrossRef Weng, J., Chen, M., Yang, Y., Deng, R., Chen, K., Bao, F.: CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. China Inf. Sci. 53, 593–606 (2010)MathSciNetCrossRef
21.
Zurück zum Zitat Weng, J., Chen, M., Yang, Y., Deng, R., Chen, K., Bao, F.: CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Cryptology ePrint Archive, Report 2010/265, 2010. Available at http://eprint.iacr.org Weng, J., Chen, M., Yang, Y., Deng, R., Chen, K., Bao, F.: CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Cryptology ePrint Archive, Report 2010/265, 2010. Available at http://​eprint.​iacr.​org
22.
Zurück zum Zitat Chow, S., Weng, J., Yang, Y., Deng, R.: Efficient unidirectional proxy re-encryption. In: AFRICACRYPT 2010. Volume 6055 of LNCS, pp. 316–332 (2010)CrossRef Chow, S., Weng, J., Yang, Y., Deng, R.: Efficient unidirectional proxy re-encryption. In: AFRICACRYPT 2010. Volume 6055 of LNCS, pp. 316–332 (2010)CrossRef
Metadaten
Titel
On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Scheme
verfasst von
Xu An Wang
Arun Kumar Sangaiah
Nadia Nedjah
Chun Shan
Zuliang Wang
Copyright-Jahr
2019
DOI
https://doi.org/10.1007/978-3-030-02607-3_18

Neuer Inhalt