Skip to main content

On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Scheme

  • Conference paper
  • First Online:
  • 1094 Accesses

Part of the book series: Lecture Notes on Data Engineering and Communications Technologies ((LNDECT,volume 24))

Abstract

Proxy re-encryption acts an important role in secure data sharing in cloud storage. There are many variants of proxy re-encryption until now, in this paper we focus on the timed-realise conditional proxy broadcast re-encryption. In this primitive, if and only the condition and time satisfied the requirement, the proxy can re-encrypt the delegator(broadcast encryption set)’s ciphertext to be the delegatee(another broadcast encryption set)’s ciphertext. Chosen cipertext security (CCA-security) is an important security notion for encryption scheme. In the security model of CCA-security, the adversary can query the decryption oracle to get help, with the only restriction the challenge ciphertext can not be queried to the decryption oracle. For CCA-security of time-realised conditional proxy broadcast re-encryption, the situation is more complicated for this time the adversary can not only get the decryption oracle of normal ciphertext but also the decryption oracle of the re-encrypted ciphertext and the re-encrypted key generation oracle. In 2013, Liang et al. proposed a CCA-secure time-realised conditional proxy broadcast re-encryption scheme, in this paper, we show their proposal is not CCA-secure in the security model of CCA-secure time-realised conditional proxy broadcast re-encryption.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT’98. Volume 1403 of LNCS, pp. 127–144, Espoo, Finland, May 31–June 4, 1998. Springer, Berlin

    Google Scholar 

  2. Ivan, A., Dodis, Y.: Proxy cryptography revisited. In: NDSS 2003, San Diego, California, USA, February 5–7, 2003. The Internet Society

    Google Scholar 

  3. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS 2005, San Diego, California, USA, February 3–4, 2005. The Internet Society

    Google Scholar 

  4. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)

    Article  Google Scholar 

  5. Chiu, Y.-P., Lei, C.-L., Huang, C.-Y.: Secure multicast using proxy encryption. In: Qing, S., Mao, W., López, J., Wang, G. (eds.) ICICS 05. Volume 3783 of LNCS, pp. 280–290, Beijing, China, December 10–13, 2005. Springer, Berlin, Germany (2005)

    Chapter  Google Scholar 

  6. Chu, C., Chow, S., Weng, J., Zhou, J., Deng, R.H.: Conditional proxy broadcast re-encryption. In: ACISP 2009. Volume 5594 of LNCS, pp. 327–342 (2009)

    Chapter  Google Scholar 

  7. Shao, J., Liu, P., Wei, G., Ling, Y.: Anonymous proxy re-encryption. Secur. Commun. Netw. 5(5), 439–449 (2012)

    Article  Google Scholar 

  8. Liang, K., Au, M.H., Liu, J.K., Qi, X., Susilo, W., Tran, X.P., Wong, D.S., Yang, G.: A dfa-based functional proxy re-encryption scheme for secure public cloud data sharing. IEEE Trans. Inf. Forensics Secur. 9(10), 1667–1680 (2014)

    Article  Google Scholar 

  9. Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Kutylowski, M., Vaidya, J. (eds.) ESORICS 2014, Part I. Volume 8712 of LNCS, pp. 257–272, Wroclaw, Poland, September 7–11, 2014. Springer, Berlin, Germany

    Google Scholar 

  10. Wang, Ying, Jiali, Du, Cheng, Xiaochun, Liu, Zheli, Lin, Kai: Degradation and encryption for outsourced PNG images in cloud storage. Int. J. Grid Util. Comput. 7(1), 22–28 (2016)

    Article  Google Scholar 

  11. Zhu, Shuaishuai, Yang, Xiaoyuan: Protecting data in cloud environment with attribute-based encryption. Int. J. Grid Util. Comput. 6(2), 91–97 (2015)

    Article  Google Scholar 

  12. Guo, Shu, Haixia, Xu: A secure delegation scheme of large polynomial computation in multi-party cloud. Int. J. Grid Util. Comput. 6(2), 1–7 (2015)

    Google Scholar 

  13. Dutu, Cristina, Apostol, Elena, Leordeanu, Catalin, Cristea, Valentin: A solution for the management of multimedia sessions in hybrid clouds. Int. J. Space-Based Situated Comput. 4(2), 77–87 (2014)

    Article  Google Scholar 

  14. Thabet, Meriem, Boufaida, Mahmoud, Kordon, Fabrice: An approach for developing an interoperability mechanism between cloud providers. Int. J. Space-Based Situated Comput. 4(2), 88–99 (2014)

    Article  Google Scholar 

  15. Wang, L., Wang, L., Mambo,M., Okamoto, E.: Identity-based proxy cryptosystems with revocability and hierarchical confidentialities. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 10. Volume 6476 of LNCS, pp. 383–400, Barcelona, Spain, December 15–17, 2010. Springer, Berlin, Germany

    Chapter  Google Scholar 

  16. Liang, K., Huang, Q., Schlegel, R., Wong, D.S., Tang, C.: A conditional proxy broadcast re-encryption scheme supporting timed-release. In: ISPEC 2013. LNCS, vol. 7863, pp. 132–146. Springer, Heidelberg (2013)

    Chapter  Google Scholar 

  17. X. Wang, X. Yang, F. Li. On the Role of PKG for Proxy Re-encryption in the Identity Based Setting. Available at Cryptology ePrint Archive, Report 2008/410, 2008

    Google Scholar 

  18. Weng, J., Deng, R.H., Chu, C., Ding, X., Lai, J.: Conditional proxy re-encryption secure against chosen-ciphertext attack. ACM ASIACCS 2009, 322–332 (2009)

    Google Scholar 

  19. Weng, J., Yang, Y., Tang, Q., Deng, R., Bao, F.: Efficient conditional proxy re-encryption with chosen-ciphertext security. In: ISC 2009. Volume 5735 of LNCS, pp. 151–166 (2008)

    Google Scholar 

  20. Weng, J., Chen, M., Yang, Y., Deng, R., Chen, K., Bao, F.: CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. China Inf. Sci. 53, 593–606 (2010)

    Article  MathSciNet  Google Scholar 

  21. Weng, J., Chen, M., Yang, Y., Deng, R., Chen, K., Bao, F.: CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Cryptology ePrint Archive, Report 2010/265, 2010. Available at http://eprint.iacr.org

  22. Chow, S., Weng, J., Yang, Y., Deng, R.: Efficient unidirectional proxy re-encryption. In: AFRICACRYPT 2010. Volume 6055 of LNCS, pp. 316–332 (2010)

    Chapter  Google Scholar 

Download references

Acknowledgements

This work is supported by National Cryptography Development Fund of China Under Grants No. MMJJ20170112, National Natural Science Foundation of China (Grant Nos. 61772550, 61572521, U1636114, 61402531), National Key Research and Development Program of China Under Grants No. 2017YFB0802000, Natural Science Basic Research Plan in Shaanxi Province of china (Grant Nos. 2018JM6028, 2016JQ6037) and Guangxi Key Laboratory of Cryptography and Information Security (No. GCIS201610).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Xu An Wang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, X.A., Sangaiah, A.K., Nedjah, N., Shan, C., Wang, Z. (2019). On the Security of a CCA-Secure Timed-Release Conditional Proxy Broadcast Re-encryption Scheme. In: Xhafa, F., Leu, FY., Ficco, M., Yang, CT. (eds) Advances on P2P, Parallel, Grid, Cloud and Internet Computing. 3PGCIC 2018. Lecture Notes on Data Engineering and Communications Technologies, vol 24. Springer, Cham. https://doi.org/10.1007/978-3-030-02607-3_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-02607-3_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-02606-6

  • Online ISBN: 978-3-030-02607-3

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics