Abstract
Proxy re-encryption acts an important role in secure data sharing in cloud storage. There are many variants of proxy re-encryption until now, in this paper we focus on the timed-realise conditional proxy broadcast re-encryption. In this primitive, if and only the condition and time satisfied the requirement, the proxy can re-encrypt the delegator(broadcast encryption set)’s ciphertext to be the delegatee(another broadcast encryption set)’s ciphertext. Chosen cipertext security (CCA-security) is an important security notion for encryption scheme. In the security model of CCA-security, the adversary can query the decryption oracle to get help, with the only restriction the challenge ciphertext can not be queried to the decryption oracle. For CCA-security of time-realised conditional proxy broadcast re-encryption, the situation is more complicated for this time the adversary can not only get the decryption oracle of normal ciphertext but also the decryption oracle of the re-encrypted ciphertext and the re-encrypted key generation oracle. In 2013, Liang et al. proposed a CCA-secure time-realised conditional proxy broadcast re-encryption scheme, in this paper, we show their proposal is not CCA-secure in the security model of CCA-secure time-realised conditional proxy broadcast re-encryption.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT’98. Volume 1403 of LNCS, pp. 127–144, Espoo, Finland, May 31–June 4, 1998. Springer, Berlin
Ivan, A., Dodis, Y.: Proxy cryptography revisited. In: NDSS 2003, San Diego, California, USA, February 5–7, 2003. The Internet Society
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS 2005, San Diego, California, USA, February 3–4, 2005. The Internet Society
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)
Chiu, Y.-P., Lei, C.-L., Huang, C.-Y.: Secure multicast using proxy encryption. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 05. Volume 3783 of LNCS, pp. 280–290, Beijing, China, December 10–13, 2005. Springer, Berlin, Germany (2005)
Chu, C., Chow, S., Weng, J., Zhou, J., Deng, R.H.: Conditional proxy broadcast re-encryption. In: ACISP 2009. Volume 5594 of LNCS, pp. 327–342 (2009)
Shao, J., Liu, P., Wei, G., Ling, Y.: Anonymous proxy re-encryption. Secur. Commun. Netw. 5(5), 439–449 (2012)
Liang, K., Au, M.H., Liu, J.K., Qi, X., Susilo, W., Tran, X.P., Wong, D.S., Yang, G.: A dfa-based functional proxy re-encryption scheme for secure public cloud data sharing. IEEE Trans. Inf. Forensics Secur. 9(10), 1667–1680 (2014)
Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Kutylowski, M., Vaidya, J. (eds.) ESORICS 2014, Part I. Volume 8712 of LNCS, pp. 257–272, Wroclaw, Poland, September 7–11, 2014. Springer, Berlin, Germany
Wang, Ying, Jiali, Du, Cheng, Xiaochun, Liu, Zheli, Lin, Kai: Degradation and encryption for outsourced PNG images in cloud storage. Int. J. Grid Util. Comput. 7(1), 22–28 (2016)
Zhu, Shuaishuai, Yang, Xiaoyuan: Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6(2), 91–97 (2015)
Guo, Shu, Haixia, Xu: A secure delegation scheme of large polynomial computation in multi-party cloud. Int. J. Grid Util. Comput. 6(2), 1–7 (2015)
Dutu, Cristina, Apostol, Elena, Leordeanu, Catalin, Cristea, Valentin: A solution for the management of multimedia sessions in hybrid clouds. Int. J. Space-Based Situated Comput. 4(2), 77–87 (2014)
Thabet, Meriem, Boufaida, Mahmoud, Kordon, Fabrice: An approach for developing an interoperability mechanism between cloud providers. Int. J. Space-Based Situated Comput. 4(2), 88–99 (2014)
Wang, L., Wang, L., Mambo,M., Okamoto, E.: Identity-based proxy cryptosystems with revocability and hierarchical confidentialities. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 10. Volume 6476 of LNCS, pp. 383–400, Barcelona, Spain, December 15–17, 2010. Springer, Berlin, Germany
Liang, K., Huang, Q., Schlegel, R., Wong, D.S., Tang, C.: A conditional proxy broadcast re-encryption scheme supporting timed-release. In: ISPEC 2013. LNCS, vol. 7863, pp. 132–146. Springer, Heidelberg (2013)
X. Wang, X. Yang, F. Li. On the Role of PKG for Proxy Re-encryption in the Identity Based Setting. Available at Cryptology ePrint Archive, Report 2008/410, 2008
Weng, J., Deng, R.H., Chu, C., Ding, X., Lai, J.: Conditional proxy re-encryption secure against chosen-ciphertext attack. ACM ASIACCS 2009, 322–332 (2009)
Weng, J., Yang, Y., Tang, Q., Deng, R., Bao, F.: Efficient conditional proxy re-encryption with chosen-ciphertext security. In: ISC 2009. Volume 5735 of LNCS, pp. 151–166 (2008)
Weng, J., Chen, M., Yang, Y., Deng, R., Chen, K., Bao, F.: CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. China Inf. Sci. 53, 593–606 (2010)
Weng, J., Chen, M., Yang, Y., Deng, R., Chen, K., Bao, F.: CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Cryptology ePrint Archive, Report 2010/265, 2010. Available at http://eprint.iacr.org
Chow, S., Weng, J., Yang, Y., Deng, R.: Efficient unidirectional proxy re-encryption. In: AFRICACRYPT 2010. Volume 6055 of LNCS, pp. 316–332 (2010)
Acknowledgements
This work is supported by National Cryptography Development Fund of China Under Grants No. MMJJ20170112, National Natural Science Foundation of China (Grant Nos. 61772550, 61572521, U1636114, 61402531), National Key Research and Development Program of China Under Grants No. 2017YFB0802000, Natural Science Basic Research Plan in Shaanxi Province of china (Grant Nos. 2018JM6028, 2016JQ6037) and Guangxi Key Laboratory of Cryptography and Information Security (No. GCIS201610).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, X.A., Sangaiah, A.K., Nedjah, N., Shan, C., Wang, Z. (2019). On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Scheme. In: Xhafa, F., Leu, FY., Ficco, M., Yang, CT. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 24. Springer, Cham. https://doi.org/10.1007/978-3-030-02607-3_18
Download citation
DOI: https://doi.org/10.1007/978-3-030-02607-3_18
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-02606-6
Online ISBN: 978-3-030-02607-3
eBook Packages: EngineeringEngineering (R0)