Non-transitive Bidirectional Proxy Re-encryption Scheme

Jindan Zhang, Xu An Wang
{"title":"Non-transitive Bidirectional Proxy Re-encryption Scheme","authors":"Jindan Zhang, Xu An Wang","doi":"10.1109/ICNDS.2009.59","DOIUrl":null,"url":null,"abstract":"In 1998, Blaze, Bleumer and Strauss proposed two kinds of cryptographic primitives called proxy re-encryption and proxy re-signature\\cite{Blaze:98}. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice's public key into one that can be opened under Bob's decryption key. In proxy re-signature, a proxy can transform a signature computed under Alice's secret key into one that can be verified by Bob's public key. They divided the proxy re-cryptography into two kinds: One kind is bidirectional proxy re-cryptography and the other kind is unidirectional proxy re-cryptography. In 2005, Ateniese et al proposed the first unidirectional proxy re-encryption schemes and discussed its several potential applications especially in secure distributed storage\\cite{Ateniese:05}. In 2006, they proposed another few re-signature schemes and also discussed its several potential applications\\cite{Ateniese:06}. In 2007, Canetti and Hohenberger proposed the first chosen ciphertext secure bidirectional proxy re-encryption schemes\\cite{Canetti:07}. In this paper, we show that there exists a security flaw in all the bidirectional proxy re-cryptography schemes proposed until now. Specially, all the bidirectional proxy re-cryptography schemes can not satisfy the non-transitive property. The proxy himself can generate re-encryption key or re-signature key $rk_{a\\leftrightarrow c}$ by giving re-encryption key $rk_{a \\leftrightarrow b}$ and $rk_{b \\leftrightarrow c}$. Thus we propose a new framework for proxy re-encryption. This new framework can bring us two benefits: First, the delegator can now relocate delegation right easily. Second, we can construct bidirectional proxy re-cryptography schemes which are no longer transitive. Based on this framework, we construct a concrete non-transitive proxy re-encryption scheme.","PeriodicalId":154117,"journal":{"name":"2009 International Conference on Networking and Digital Society","volume":"22 2","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2009-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2009 International Conference on Networking and Digital Society","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICNDS.2009.59","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

In 1998, Blaze, Bleumer and Strauss proposed two kinds of cryptographic primitives called proxy re-encryption and proxy re-signature\cite{Blaze:98}. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice's public key into one that can be opened under Bob's decryption key. In proxy re-signature, a proxy can transform a signature computed under Alice's secret key into one that can be verified by Bob's public key. They divided the proxy re-cryptography into two kinds: One kind is bidirectional proxy re-cryptography and the other kind is unidirectional proxy re-cryptography. In 2005, Ateniese et al proposed the first unidirectional proxy re-encryption schemes and discussed its several potential applications especially in secure distributed storage\cite{Ateniese:05}. In 2006, they proposed another few re-signature schemes and also discussed its several potential applications\cite{Ateniese:06}. In 2007, Canetti and Hohenberger proposed the first chosen ciphertext secure bidirectional proxy re-encryption schemes\cite{Canetti:07}. In this paper, we show that there exists a security flaw in all the bidirectional proxy re-cryptography schemes proposed until now. Specially, all the bidirectional proxy re-cryptography schemes can not satisfy the non-transitive property. The proxy himself can generate re-encryption key or re-signature key $rk_{a\leftrightarrow c}$ by giving re-encryption key $rk_{a \leftrightarrow b}$ and $rk_{b \leftrightarrow c}$. Thus we propose a new framework for proxy re-encryption. This new framework can bring us two benefits: First, the delegator can now relocate delegation right easily. Second, we can construct bidirectional proxy re-cryptography schemes which are no longer transitive. Based on this framework, we construct a concrete non-transitive proxy re-encryption scheme.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
非传递双向代理重加密方案
1998年,Blaze、Bleumer和Strauss提出了两种加密原语:代理重加密和代理重签名\cite{Blaze:98}。在代理重新加密中,代理可以将在Alice的公钥下计算的密文转换为可以在Bob的解密密钥下打开的密文。在代理重新签名中,代理可以将在Alice的秘钥下计算的签名转换为可以由Bob的公钥验证的签名。他们将代理重新加密分为两种:一种是双向代理重新加密,另一种是单向代理重新加密。2005年,Ateniese等人提出了第一个单向代理重加密方案,并讨论了其在安全分布式存储\cite{Ateniese:05}中的几种潜在应用。2006年,他们提出了另外几个重新签名方案,并讨论了它的几个潜在应用\cite{Ateniese:06}。2007年,Canetti和Hohenberger提出了首个选择密文安全的双向代理重加密方案\cite{Canetti:07}。在本文中,我们证明了目前提出的所有双向代理重加密方案都存在安全漏洞。特别地,所有的双向代理重密码方案都不能满足不可传递性。代理本身可以通过提供重新加密密钥$rk_{a \leftrightarrow b}$和$rk_{b \leftrightarrow c}$来生成重新加密密钥或重新签名密钥$rk_{a\leftrightarrow c}$。因此,我们提出了一种新的代理重加密框架。这个新框架可以给我们带来两个好处:首先,委托现在可以很容易地重新定位委托。其次,我们可以构造不再传递的双向代理重加密方案。在此框架的基础上,构造了一个具体的非传递代理重加密方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Non-transitive Bidirectional Proxy Re-encryption Scheme Application of Digital Technology in Open and Distance Education PDM-Based Product Design Knowledge Integration Assessment of Network Teaching Resources Based on Fuzzy Synthesize Evaluation The P2P Network Resources Localization Algorithm Research and Improvement Based on JXTA Platform
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1