Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attacks

In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has found many practical applications requiring delegation. However, it is inadequate to handle scenarios where a fine-gr...

Full description

Saved in:
Bibliographic Details
Main Authors: Weng, Jian, DENG, Robert H., DING, Xuhua, CHU, Cheng-Kang, LAI, Junzuo
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2009
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/453
http://dx.doi.org/10.1145/1533057.1533100
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-1452
record_format dspace
spelling sg-smu-ink.sis_research-14522010-09-24T06:36:22Z Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attacks Weng, Jian DENG, Robert H. DING, Xuhua CHU, Cheng-Kang LAI, Junzuo In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has found many practical applications requiring delegation. However, it is inadequate to handle scenarios where a fine-grained delegation is demanded. To overcome the limitation of existing PRE systems, we introduce the notion of conditional proxy re-encryption (C-PRE), whereby only ci-phertext satisfying a specific condition set by Alice can be transformed by the proxy and then decrypted by Bob. We formalize its security model and propose an efficient C-PRE scheme, whose chosen-ciphertext security is proven under the 3-quotient bilinear Diffie-Hellman assumption. We further extend the construction to allow multiple conditions with a slightly higher overhead. 2009-02-01T08:00:00Z text https://ink.library.smu.edu.sg/sis_research/453 info:doi/10.1145/1533057.1533100 http://dx.doi.org/10.1145/1533057.1533100 Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Information Security
spellingShingle Information Security
Weng, Jian
DENG, Robert H.
DING, Xuhua
CHU, Cheng-Kang
LAI, Junzuo
Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attacks
description In a proxy re-encryption (PRE) system [4], a proxy, authorized by Alice, can convert a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. PRE has found many practical applications requiring delegation. However, it is inadequate to handle scenarios where a fine-grained delegation is demanded. To overcome the limitation of existing PRE systems, we introduce the notion of conditional proxy re-encryption (C-PRE), whereby only ci-phertext satisfying a specific condition set by Alice can be transformed by the proxy and then decrypted by Bob. We formalize its security model and propose an efficient C-PRE scheme, whose chosen-ciphertext security is proven under the 3-quotient bilinear Diffie-Hellman assumption. We further extend the construction to allow multiple conditions with a slightly higher overhead.
format text
author Weng, Jian
DENG, Robert H.
DING, Xuhua
CHU, Cheng-Kang
LAI, Junzuo
author_facet Weng, Jian
DENG, Robert H.
DING, Xuhua
CHU, Cheng-Kang
LAI, Junzuo
author_sort Weng, Jian
title Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attacks
title_short Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attacks
title_full Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attacks
title_fullStr Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attacks
title_full_unstemmed Conditional Proxy Re-Encryption Secure against Chosen-Ciphertext Attacks
title_sort conditional proxy re-encryption secure against chosen-ciphertext attacks
publisher Institutional Knowledge at Singapore Management University
publishDate 2009
url https://ink.library.smu.edu.sg/sis_research/453
http://dx.doi.org/10.1145/1533057.1533100
_version_ 1770570430511316992