Fully-Anonymous Functional Proxy-Re-Encryption
نویسندگان
چکیده
In this paper, we introduce a general notion of functional proxy-re-encryption (F-PRE), where a wide class of functional encryption (FE) is combined with proxy-re-encryption (PRE) mechanism. The PRE encryption system should reveal minimal information to a proxy, in particular, hiding parameters of re-encryption keys and of original ciphertexts which he manipulate is highly desirable. We first formulate such a fully-anonymous security notion of F-PRE including usual payload-hiding properties. We then propose the first fully-anonymous inner-product PRE (IP-PRE) scheme, whose security is proven under the DLIN assumption and the existence of a strongly unforgeable one-time signature scheme in the standard model. Also, we propose the first ciphertext-policy F-PRE scheme with the access structures of Okamoto-Takashima (CRYPTO 2010), which also has an anonymity property for re-encryption keys as well as payload-hiding for original and re-encrypted ciphertexts. The security is proven under the same assumptions as the above IP-PRE scheme in the standard model. For these results, we develop novel blind delegation and new hidden subspace generation techniques on the dual system encryption (DSE) technique and the dual pairing vector spaces (DPVS). These techniques seem difficult to be realized by a composite-order bilinear group DSE approach.
منابع مشابه
A Fully Secure Unidirectional and Multi-use Proxy Re-encryption Scheme
In a proxy re-encryption scheme, a ciphertext for Alice can be converted into a ciphertext for Bob with the help of a semi-trusted proxy, while the proxy gets no information about the messages encrypted under either key during the conversion. Proxy re-encryption has become more and more popular these years due to its practical applications. In this paper, we propose a fully secure proxy re-encr...
متن کاملEFADS: Efficient, flexible and anonymous data sharing protocol for cloud computing with proxy re-encryption
Article history: Received 28 January 2013 Received in revised form 20 August 2013 Accepted 10 April 2014 Available online 23 April 2014
متن کاملKey-Private Proxy Re-encryption
Proxy re-encryption (PRE) allows a proxy to convert a ciphertext encrypted under one key into an encryption of the same message under another key. The main idea is to place as little trust and reveal as little information to the proxy as necessary to allow it to perform its translations. At the very least, the proxy should not be able to learn the keys of the participants or the content of the ...
متن کاملLattice Based Identity Based Proxy Re-Encryption Scheme
At Eurocrypt 1998, Blaze, Bleumer and Strauss (BBS) presented a new primitive called proxy reencryption. This new primitive allows semi trusted proxy to convert a ciphertext for Alice into a ciphertext for Bob without underlying message. Till now all the identity based proxy re-encryption schemes are based on the number theoretic assumptions like prime factorization, discrete logarithm problem ...
متن کاملChosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
Weng et al. introduced the notion of conditional proxy re-encryption (or C-PRE, for short), whereby only the ciphertext satisfying one condition set by the delegator can be transformed by the proxy and then decrypted by delegatee. Nonetheless, they left an open problem on how to construct CCA-secure C-PRE schemes with anonymity. Fang et al. answered this question by presenting a construction of...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IACR Cryptology ePrint Archive
دوره 2013 شماره
صفحات -
تاریخ انتشار 2013