ZHOU Dehua, CHEN Kefei, LIU Shengli, et al., “Identity-Based Conditional Proxy Re-Encryption,” Chinese Journal of Electronics, vol. 22, no. 1, pp. 61-66, 2013,
Citation: ZHOU Dehua, CHEN Kefei, LIU Shengli, et al., “Identity-Based Conditional Proxy Re-Encryption,” Chinese Journal of Electronics, vol. 22, no. 1, pp. 61-66, 2013,

Identity-Based Conditional Proxy Re-Encryption

Funds:  This work is supported by the National Natural Science Foundation of China (No.61133014, No.61070249, No.61005049, No.60903178, No.60970111), the Fundamental Research Funds for the Central Universities (No.21612335), the Research Fund for the Doctoral Program of Higher Education of China (No.20100073110060), the Innovation Project (No.12ZZ021) of Shanghai Municipal Education Commission.
  • Received Date: 2010-12-01
  • Rev Recd Date: 2012-04-01
  • Publish Date: 2013-01-05
  • In a Idendity-based proxy re-encryption (IBPRE) scheme, a proxy, converts a ciphertext for one identity into a ciphertext for another identity without knowing the underlying plaintext. IBPRE can be used for applications requiring delegation, such as delegated email processing. However, some scenarios require handle a fine-grained delegation. For example, the delegator wants to limit the proxy to only re-encrypt the encrypted emails associated with specific conditions. To overcome the limitation of existing IBPRE, we introduce the notion of Identity-based conditional proxy re-encryption (IBCPRE), whereby only ciphertext satisfying one condition set by delegator can be transformed by the proxy and then can be decrypted by delegatee. We further proposed a concrete IBCPRE scheme, and prove its security in the standard model.
  • loading
  • M. Blaze, G. Bleumer and M. Strauss, “Divertible protocols andatomic proxy cryptography”, Proc. of Eurocrypt’98, Springer-Verlag, LNCS 1403, Espoo, Finland, pp.127-144, 1998.
    G. Ateniese, K. Fu, M. Green and S. Hohenberger, “Improvedproxy re-encryption schemes with applications to secure distributedstorage”, Proc. of NDSS 2005, San Diego, California,USA, pp.29-43, 2005.
    G. Ateniese, K. Fu, M. Green and S. Hohenberger, “Improvedproxy re-encryption schemes with applications to secure distributedstorage”, ACM Transactions on Information and SystemSecurity (TISSEC), Vol.9, No.1, pp.1-30, 2006.
    R. Caneti R and S. Hohenberger, “Chosen-ciphertext secureproxy re-encryption”, Proc. of ACM CCS 2007, ACM Press,Alexandria, VA, USA, pp.185-194, 2007.
    B. Libert B and D. Vergnaud, “Unidirectional chosen-ciphertextsecure proxy re-encryption”, Proc. of PKC’08, Springer-Verlag,LNCS 4929, Barcelona, Spain, pp.360-379, 2008.
    R.H. Deng, J. Weng, S. Liu and K. Chen, “Chosen-cipertext secureproxy re-encryption without pairings”, Proc. of CANS’08,Springer-Verlag, LNCS 5339, Hong Kong, China, pp.1-17, 2008.
    J. Weng, S. Chow, Y. Yang and R.H. Deng, “Efficient unidirectionalproxy re-encryption”, Cryptology ePrint Archive, Report2009/189. 2009.
    J. Zhao, D. Feng, L. Yang and L. Ma, “CCA-secure type-basedproxy re-encryption without pairings”, Acta Electronica Sinica,Vol.39, No.11, pp.2513-2519, 2011. (in Chinese)
    M. Green and G. Ateniese, “Identity-based proxy reencryption”,Proc. of ACNS’07, Springer-Verlag, LNCS 4521,Zhuhai, China, pp.288-306, 2007.
    M. Mambo and E. Okamoto, “Proxy cryptosystems: Delegationof the power to decrypt ciphertexts”, IEICE Trans. Fund.Electronics Communications and Computer Science, Vol.E80-A, No.1, pp.54-63, 1997.
    J. Weng, M. Chen, Y. Yang, R.H. Deng, K. Chen and F. Bao,“CCA-secure unidirectional proxy re-encryption in the adaptivecorruption model without random oracles”, Science China: InformationScience, Vol.53, No.3, pp.593-606, 2010.
    B. Libert B and D. Vergnaud, “Tracing malicious proxies inproxy re-encryption”, Proc. of Pairing’08, Springer-Verlag,LNCS 5209, Egham, UK, pp.332-353, 2008.
    J. Weng, R.H. Deng, X. Ding, C. Chu and J. Lai, “Conditionalproxy re-encryption secure against chosen-ciphertext attack”,Proc. of ASIACCS’09, ACM Press, Sydney, Australia, pp.322-332, 2009.
    T. Matsuo, “Proxy re-encryption systems for identity-based encryption”,Proc. of Paring’07, LNCS 4575, Springer-Verlag,Tokyo, Japan, pp.247-267, 2007.
    T. ElGamal, “A public-key cryptosystem and a signaturescheme based on discrete logarithms”, Proc.of Crypto’84,Springer-Verlag, LNCS 196, Santa Barbara, California, USA,pp.10-18, 1984.
    D. Boneh and X. Boyen, “Efficient selective-ID secure identitybased encryption without random oracles”, Proc.of Eurocrypt’04, Springer-Verlag, LNCS 3027, Interlaken, Switzerland,pp.223-238, 2004.
    D. Boneh, E.J. Goh and T. Matsuo, “Proposal for P1363.3proxy re-encryption”, http://grouper.ieee.org/groups/1363/IBC/submissions/NTTDataProposal -for-P1363.3-2006-08-14.pdf.
    D. Boneh and M. Franklin, “Identity based encryption from theWeil pairing”, Proc.of Crypto’01, Springer-Verlag, LNCS 2139,Santa Barbara, California, USA, pp.213-229, 2001.
    C. Chu and W. Tzeng, “Identity-based proxy re-encryptionwithout random oracles”, Proc. of ISC’07, Springer-Verlag,LNCS 4779, Valparaíso, Chile, pp.189-202, 2007.
    B. Waters, “Efficient identity-based encryption without randomoracles”, Proc. of Eurocrypt’05, Springer-Verlag, LNCS 3494,Aarhus, Denmark, pp.114-127, 2005.
    J. Weng, Y. Yang, Q. Tang, R.H. Deng and F. Bao, “Efficientconditional proxy re-encryption with chosen-ciphertext security”,Proc. of ISC’09, Springer-Verlag, LNCS 5735, Pisa, Italy,pp.151-166, 2009.
    R. Canetti, H. Krawczyk and J.B. Nielsen, “Relaxing chosenciphertextsecurity”, Proc.of Crypto’03, Springer-Verlag, LNCS2729, Santa Barbara, California, USA, pp.565-582, 2003.
    R. Canetti, S. Halevi and J. Katz, “Chosen-ciphertext securityfrom identity-based encryption”, Proc. of Eurocrypt’04,Springer-Verlag, LNCS 3027, Interlaken, Switzerland, pp.207-222, 2004.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views (862) PDF downloads(1919) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return