Browse > Article

ID-Based Proxy Re-encryption Scheme with Chosen-Ciphertext Security  

Koo, Woo-Kwon (Graduate School of Information Management & Security, Korea University)
Hwang, Jung-Yeon (Graduate School of Information Management & Security, Korea University)
Kim, Hyoung-Joong (Graduate School of Information Management & Security, Korea University)
Lee, Dong-Hoon (Graduate School of Information Management & Security, Korea University)
Publication Information
Abstract
A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a ciphertext for Alice into the ciphertext for Bob. Recently, ID-based proxy re-encryption schemes are receiving considerable attention for a variety of applications such as distributed storage, DRM, and email-forwarding system. And a non-interactive identity-based proxy re-encryption scheme was proposed for achieving CCA-security by Green and Ateniese. In the paper, we show that the identity-based proxy re-encryption scheme is unfortunately vulnerable to a collusion attack. The collusion of a proxy and a malicious user enables two parties to derive other honest users' private keys and thereby decrypt ciphertexts intended for only the honest user. To solve this problem, we propose two ID-based proxy re-encryption scheme schemes, which are proved secure under CPA and CCA in the random oracle model. For achieving CCA-security, we present self-authentication tag based on short signature. Important features of proposed scheme is that ciphertext structure is preserved after the ciphertext is re-encrypted. Therefore it does not lead to ciphertext expansion. And there is no limitation on the number of re-encryption.
Keywords
Identity-Based Proxy Re-encryption; Identity-Based Encryption; CCA-Security; Collusion Attack;
Citations & Related Records
연도 인용수 순위
  • Reference
1 M. Blaze, G. Bleumer, M. Strauss, 'Divertible protocols and atomic proxy cryptography', In: Proceedings of Eurocrypt '98. Volume 1403. (1998) 127–44   DOI   ScienceOn
2 R. Canetti, S. Halevi, J. Katz., 'Chosen- Ciphertext Security from Identity-Based Encryption', In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207–.222. Springer, Heidelberg (2004)   DOI   ScienceOn
3 R. Canetti, S. Hohenberger, 'Chosen-Ciphertext Secure Proxy Re-Encryption', In: ACM CCS 2007, pp. 185–.194. New York (2007)
4 E. Fujisaki, T. Okamoto, 'Secure integration of asymmetric and symmetric encryption schemes' In: Proceedings of Crypto '99. Volume 1666 of Lecture Notes in Computer Science., Springer (1999) 537–54   DOI
5 M. Green, G. Ateniese, 'Identity-Based Proxy Re-encryption', In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288–.306. Springer, Heidelberg (2007)   DOI   ScienceOn
6 G. Ateniese, K, Fu, M. Green, S. Hohenberger, 'Improved proxy re-encryption schemes with applications to secure distributed storage', ACM TISSEC 9(1), 1–.30 (2006)   DOI
7 M. Mambo, E. Okamoto,: Proxy Cryptosystems, 'Delegation of the Power to Decrypt Ciphertexts', IEICE Trans. Fund. Elect. Communications and CS, E80-A/1, 54–.63 (1997)
8 B. Libert, D. Vergnaud,, 'Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption', In: PKC 2008. LNCS, vol. 4939, pp. 360–.379. Springer, Heidelberg (2008)   DOI   ScienceOn
9 T. Matsuo, 'Proxy Re-encryption Systems for Identity-Based Encryption', In: Pairing 2007. LNCS, vol. 4575, pp. 247–.367. Springer, Heidelberg   DOI   ScienceOn
10 Y. Dodis, A. Ivan, 'Proxy cryptography revisited', In: Proceedings of the Tenth Network and Distributed System Security Symposium. (2003)
11 P. Yang, T. Kitagawa, G. Hanaoka, R. Zhang, K. Matsurra, H. Imai, 'Applying Fugisaki-Okamoto to Identity-Based Encryption,' Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC-16). LNCS, vol. 3857, pp. 183–192. Springer, Heidelberg (2006)   DOI   ScienceOn
12 D. Boneh, M. Franklin, 'Identity-based encryption from the Weil pairing', In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–.229. Springer, Heidelberg (2001)   DOI   ScienceOn
13 G. Ateniese, K. Fu, M. Green and S. Hohenberger, 'Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage', In: NDSS (2005)
14 D. Boneh, E.J. Goh, T. Matsuo, 'Proposal for P1363.3 Proxy Re-encryption' (http: //grouper.ieee.org/groups/1363/IBC/submissions/NTTDataProposalfor-P1363.3-2006-09-01.pdf)