On the security of two identity-based conditional proxy re-encryption schemes
Proxy re-encryption allows a semi-trusted proxy with a re-encryption key to convert a delegator's ciphertext into a delegatee's ciphertext, and the semi-trusted proxy cannot learn anything about the underlying plaintext. If a proxy re-encryption scheme is indistinguishable against chosen-c...
Saved in:
Main Authors: | , , , |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2016
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/3881 https://ink.library.smu.edu.sg/context/sis_research/article/4883/viewcontent/SecurityIdentityBasedConditionalProxyReEncrytion_2016_afv.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
id |
sg-smu-ink.sis_research-4883 |
---|---|
record_format |
dspace |
spelling |
sg-smu-ink.sis_research-48832018-06-28T08:27:32Z On the security of two identity-based conditional proxy re-encryption schemes HE, Kai WENG, Jian DENG, Robert H. LIU, Joseph K. Proxy re-encryption allows a semi-trusted proxy with a re-encryption key to convert a delegator's ciphertext into a delegatee's ciphertext, and the semi-trusted proxy cannot learn anything about the underlying plaintext. If a proxy re-encryption scheme is indistinguishable against chosen-ciphertext attacks, its initialized ciphertext should be non-malleable. Otherwise, there might exist an adversary who can break the chosen-ciphertext security of the scheme. Recently, Liang et al. proposed two proxy re-encryption schemes. They claimed that their schemes were chosen-ciphertext secure in the standard model. However, we find that the original ciphertext in their schemes are malleable. Thus, we present some concrete attacks and indicate their schemes fail to achieve chosen-ciphertext security in the standard model. 2016-11-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3881 info:doi/10.1016/j.tcs.2016.08.023 https://ink.library.smu.edu.sg/context/sis_research/article/4883/viewcontent/SecurityIdentityBasedConditionalProxyReEncrytion_2016_afv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Conditional proxy re-encryption Identity-based Single hop Multi-hop Chosen-ciphertext security Information Security |
institution |
Singapore Management University |
building |
SMU Libraries |
continent |
Asia |
country |
Singapore Singapore |
content_provider |
SMU Libraries |
collection |
InK@SMU |
language |
English |
topic |
Conditional proxy re-encryption Identity-based Single hop Multi-hop Chosen-ciphertext security Information Security |
spellingShingle |
Conditional proxy re-encryption Identity-based Single hop Multi-hop Chosen-ciphertext security Information Security HE, Kai WENG, Jian DENG, Robert H. LIU, Joseph K. On the security of two identity-based conditional proxy re-encryption schemes |
description |
Proxy re-encryption allows a semi-trusted proxy with a re-encryption key to convert a delegator's ciphertext into a delegatee's ciphertext, and the semi-trusted proxy cannot learn anything about the underlying plaintext. If a proxy re-encryption scheme is indistinguishable against chosen-ciphertext attacks, its initialized ciphertext should be non-malleable. Otherwise, there might exist an adversary who can break the chosen-ciphertext security of the scheme. Recently, Liang et al. proposed two proxy re-encryption schemes. They claimed that their schemes were chosen-ciphertext secure in the standard model. However, we find that the original ciphertext in their schemes are malleable. Thus, we present some concrete attacks and indicate their schemes fail to achieve chosen-ciphertext security in the standard model. |
format |
text |
author |
HE, Kai WENG, Jian DENG, Robert H. LIU, Joseph K. |
author_facet |
HE, Kai WENG, Jian DENG, Robert H. LIU, Joseph K. |
author_sort |
HE, Kai |
title |
On the security of two identity-based conditional proxy re-encryption schemes |
title_short |
On the security of two identity-based conditional proxy re-encryption schemes |
title_full |
On the security of two identity-based conditional proxy re-encryption schemes |
title_fullStr |
On the security of two identity-based conditional proxy re-encryption schemes |
title_full_unstemmed |
On the security of two identity-based conditional proxy re-encryption schemes |
title_sort |
on the security of two identity-based conditional proxy re-encryption schemes |
publisher |
Institutional Knowledge at Singapore Management University |
publishDate |
2016 |
url |
https://ink.library.smu.edu.sg/sis_research/3881 https://ink.library.smu.edu.sg/context/sis_research/article/4883/viewcontent/SecurityIdentityBasedConditionalProxyReEncrytion_2016_afv.pdf |
_version_ |
1770573895789707264 |