Anonymous proxy re-encryption

Jun Shao, Peng Liu, Guiyi Wei, Yun Ling

Research output: Contribution to journalArticle

22 Citations (Scopus)

Abstract

Proxy re-encryption (PRE) is a public key encryption that allows a semi-trusted proxy with some information (a.k.a., re-encryption key) to transform a ciphertext under one public key into another ciphertext under another public key. Because of this special property, PRE has many applications, such as the distributed file system. Some of these applications demand that the underlying PRE scheme is anonymous under chosen-ciphertext attacks (CCAs); that is, the adversary cannot identify the recipient of the original/transformed ciphertext, even if it knows the PRE key and can launch the CCA. However, to the best of our knowledge, none of the existing PRE schemes satisfy this requirement. In this work, we propose the first anonymous PRE with CCA security and collusion resistance. Our proposal is proved in the random oracle model based on the DDH assumption.

Original languageEnglish (US)
Pages (from-to)439-449
Number of pages11
JournalSecurity and Communication Networks
Volume5
Issue number5
DOIs
StatePublished - Jan 1 2012

Fingerprint

Cryptography

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Networks and Communications

Cite this

Shao, Jun ; Liu, Peng ; Wei, Guiyi ; Ling, Yun. / Anonymous proxy re-encryption. In: Security and Communication Networks. 2012 ; Vol. 5, No. 5. pp. 439-449.
@article{ee4131d5e7bf4f2693888e41cd3acf04,
title = "Anonymous proxy re-encryption",
abstract = "Proxy re-encryption (PRE) is a public key encryption that allows a semi-trusted proxy with some information (a.k.a., re-encryption key) to transform a ciphertext under one public key into another ciphertext under another public key. Because of this special property, PRE has many applications, such as the distributed file system. Some of these applications demand that the underlying PRE scheme is anonymous under chosen-ciphertext attacks (CCAs); that is, the adversary cannot identify the recipient of the original/transformed ciphertext, even if it knows the PRE key and can launch the CCA. However, to the best of our knowledge, none of the existing PRE schemes satisfy this requirement. In this work, we propose the first anonymous PRE with CCA security and collusion resistance. Our proposal is proved in the random oracle model based on the DDH assumption.",
author = "Jun Shao and Peng Liu and Guiyi Wei and Yun Ling",
year = "2012",
month = "1",
day = "1",
doi = "10.1002/sec.326",
language = "English (US)",
volume = "5",
pages = "439--449",
journal = "Security and Communication Networks",
issn = "1939-0122",
publisher = "John Wiley and Sons Inc.",
number = "5",

}

Anonymous proxy re-encryption. / Shao, Jun; Liu, Peng; Wei, Guiyi; Ling, Yun.

In: Security and Communication Networks, Vol. 5, No. 5, 01.01.2012, p. 439-449.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Anonymous proxy re-encryption

AU - Shao, Jun

AU - Liu, Peng

AU - Wei, Guiyi

AU - Ling, Yun

PY - 2012/1/1

Y1 - 2012/1/1

N2 - Proxy re-encryption (PRE) is a public key encryption that allows a semi-trusted proxy with some information (a.k.a., re-encryption key) to transform a ciphertext under one public key into another ciphertext under another public key. Because of this special property, PRE has many applications, such as the distributed file system. Some of these applications demand that the underlying PRE scheme is anonymous under chosen-ciphertext attacks (CCAs); that is, the adversary cannot identify the recipient of the original/transformed ciphertext, even if it knows the PRE key and can launch the CCA. However, to the best of our knowledge, none of the existing PRE schemes satisfy this requirement. In this work, we propose the first anonymous PRE with CCA security and collusion resistance. Our proposal is proved in the random oracle model based on the DDH assumption.

AB - Proxy re-encryption (PRE) is a public key encryption that allows a semi-trusted proxy with some information (a.k.a., re-encryption key) to transform a ciphertext under one public key into another ciphertext under another public key. Because of this special property, PRE has many applications, such as the distributed file system. Some of these applications demand that the underlying PRE scheme is anonymous under chosen-ciphertext attacks (CCAs); that is, the adversary cannot identify the recipient of the original/transformed ciphertext, even if it knows the PRE key and can launch the CCA. However, to the best of our knowledge, none of the existing PRE schemes satisfy this requirement. In this work, we propose the first anonymous PRE with CCA security and collusion resistance. Our proposal is proved in the random oracle model based on the DDH assumption.

UR - http://www.scopus.com/inward/record.url?scp=84859918931&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84859918931&partnerID=8YFLogxK

U2 - 10.1002/sec.326

DO - 10.1002/sec.326

M3 - Article

AN - SCOPUS:84859918931

VL - 5

SP - 439

EP - 449

JO - Security and Communication Networks

JF - Security and Communication Networks

SN - 1939-0122

IS - 5

ER -