On the security of two identity-based conditional proxy re-encryption schemes

Proxy re-encryption allows a semi-trusted proxy with a re-encryption key to convert a delegator's ciphertext into a delegatee's ciphertext, and the semi-trusted proxy cannot learn anything about the underlying plaintext. If a proxy re-encryption scheme is indistinguishable against chosen-c...

Full description

Saved in:
Bibliographic Details
Main Authors: HE, Kai, WENG, Jian, DENG, Robert H., LIU, Joseph K.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2016
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/3881
https://ink.library.smu.edu.sg/context/sis_research/article/4883/viewcontent/SecurityIdentityBasedConditionalProxyReEncrytion_2016_afv.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-4883
record_format dspace
spelling sg-smu-ink.sis_research-48832018-06-28T08:27:32Z On the security of two identity-based conditional proxy re-encryption schemes HE, Kai WENG, Jian DENG, Robert H. LIU, Joseph K. Proxy re-encryption allows a semi-trusted proxy with a re-encryption key to convert a delegator's ciphertext into a delegatee's ciphertext, and the semi-trusted proxy cannot learn anything about the underlying plaintext. If a proxy re-encryption scheme is indistinguishable against chosen-ciphertext attacks, its initialized ciphertext should be non-malleable. Otherwise, there might exist an adversary who can break the chosen-ciphertext security of the scheme. Recently, Liang et al. proposed two proxy re-encryption schemes. They claimed that their schemes were chosen-ciphertext secure in the standard model. However, we find that the original ciphertext in their schemes are malleable. Thus, we present some concrete attacks and indicate their schemes fail to achieve chosen-ciphertext security in the standard model. 2016-11-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/3881 info:doi/10.1016/j.tcs.2016.08.023 https://ink.library.smu.edu.sg/context/sis_research/article/4883/viewcontent/SecurityIdentityBasedConditionalProxyReEncrytion_2016_afv.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Conditional proxy re-encryption Identity-based Single hop Multi-hop Chosen-ciphertext security Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Conditional proxy re-encryption
Identity-based
Single hop
Multi-hop
Chosen-ciphertext security
Information Security
spellingShingle Conditional proxy re-encryption
Identity-based
Single hop
Multi-hop
Chosen-ciphertext security
Information Security
HE, Kai
WENG, Jian
DENG, Robert H.
LIU, Joseph K.
On the security of two identity-based conditional proxy re-encryption schemes
description Proxy re-encryption allows a semi-trusted proxy with a re-encryption key to convert a delegator's ciphertext into a delegatee's ciphertext, and the semi-trusted proxy cannot learn anything about the underlying plaintext. If a proxy re-encryption scheme is indistinguishable against chosen-ciphertext attacks, its initialized ciphertext should be non-malleable. Otherwise, there might exist an adversary who can break the chosen-ciphertext security of the scheme. Recently, Liang et al. proposed two proxy re-encryption schemes. They claimed that their schemes were chosen-ciphertext secure in the standard model. However, we find that the original ciphertext in their schemes are malleable. Thus, we present some concrete attacks and indicate their schemes fail to achieve chosen-ciphertext security in the standard model.
format text
author HE, Kai
WENG, Jian
DENG, Robert H.
LIU, Joseph K.
author_facet HE, Kai
WENG, Jian
DENG, Robert H.
LIU, Joseph K.
author_sort HE, Kai
title On the security of two identity-based conditional proxy re-encryption schemes
title_short On the security of two identity-based conditional proxy re-encryption schemes
title_full On the security of two identity-based conditional proxy re-encryption schemes
title_fullStr On the security of two identity-based conditional proxy re-encryption schemes
title_full_unstemmed On the security of two identity-based conditional proxy re-encryption schemes
title_sort on the security of two identity-based conditional proxy re-encryption schemes
publisher Institutional Knowledge at Singapore Management University
publishDate 2016
url https://ink.library.smu.edu.sg/sis_research/3881
https://ink.library.smu.edu.sg/context/sis_research/article/4883/viewcontent/SecurityIdentityBasedConditionalProxyReEncrytion_2016_afv.pdf
_version_ 1770573895789707264