Header menu link for other important links
X
An efficient non-transferable proxy re-encryption scheme
S. Sharmila Deva Selvi, Arinjita Paul, Chandrasekharan Pandu Rangan
Published in Springer Verlag
2017
Volume: 719
   
Pages: 35 - 47
Abstract
Proxy re-encryption (PRE) allows re-encryption of a ciphertext for Alice (delegator) into a ciphertext for Bob (delegatee) via a semi-trusted proxy, who should not obtain the underlying plaintext. Alice generates a re-encryption key (re-key) for the proxy using which, the proxy transforms the ciphertexts. The basic notion of PRE provides security against the proxy from learning anything about the encrypted message given the re-encryption key. However, this is not sufficient in all situations as the proxy can collude with Bob and re-delegate Alice’s decryption rights. Hence, non-transferability is a desirable property in real-time scenarios wherein an illegal attempt to transfer Alice’s decryption rights exposes Bob’s private key as a penalty. In Pairing 2010, Wang et al. presented a CPA secure non-transferable Identity Based PRE scheme in the random oracle model. However, we show that the scheme violates the non-transferable property. Also, we present the first construction of a non-transferable unidirectional PRE scheme in the PKI setting using bilinear maps which meets CCA security under a variant of the decisional Diffie-Hellman hardness assumption in the random oracle model. © Springer Nature Singapore Pte Ltd. 2017.
About the journal
JournalData powered by TypesetCommunications in Computer and Information Science
PublisherData powered by TypesetSpringer Verlag
ISSN18650929
Open AccessNo
Concepts (8)
  •  related image
    Aluminum alloys
  •  related image
    Security of data
  •  related image
    BILINEAR MAP
  •  related image
    NON-TRANSFERABLE
  •  related image
    PROXY RE ENCRYPTIONS
  •  related image
    PUBLIC KEYS
  •  related image
    UNIDIRECTIONAL
  •  related image
    Cryptography