Skip to main content
Log in

Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

Condition proxy re-encryption is a promising security primitive for pervasive data sharing in such settings as cloud-based social networks and collaborations. However, it is challenging to create a secure condition proxy re-encryption scheme that is applicable for circumstances with multiple conditions. Based on secret sharing, Lan et al. proposed a conditional proxy re-encryption scheme that can support “AND” and “OR” gates over multiple conditions, and claimed that the scheme is secure against Chosen-Ciphertext Attack (CCA) in the random oracle model. However, by giving two concrete attacks, we show that their scheme is not CCA secure and even not secure against Chosen-Plaintext Attack (CPA) under their defined security model. Furthermore, we analyze why the scheme cannot satisfy the security mentioned above.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Institutional subscriptions

Fig. 1

Similar content being viewed by others

References

  1. Blaze M, Bleumer G, Strauss M (1998) Divertible Protocols and Atomic Proxy Cryptography. In: Proceedings of the Cryptology-Eurocrypt’98. LNCS, Springer, Heidelberg, 1403: pp 127–144

  2. Ateniese G, Fu K, Green M, Hohenberger S (2005) Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage. In Proceedings of NDSS 2005, pp 29–43

  3. Jahid S, Mittal P, Borisov N (2011). EASiER: Encryption-based access control in social networks with efficient revocation. In: Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ACM, pp 411–415

  4. Xu P, Jiao T, Wu Q, Wang W, Jin H (2016) Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email. IEEE Trans Comput (1): 66–79

  5. Huang QL, Ma ZF, JY F, Niu XX (2013) Authorization protocol of multimedia digital rights management based on proxy re-encryption. Journal of Beijing University of Posts and Telecommunications 36(6):7–12

    Google Scholar 

  6. Weng J, Deng RH, Ding X, Chu CK, Lai, J (2009) Conditional Proxy Reencryption Secure Against Chosen-Ciphertext Attack. In: Proceedings of ACM Symposium on Information, Computer and Communications Security (ASIACCS 2009), pp 322–332

  7. Fang L, Susilo W, Wang J (2009) Anonymous conditional proxy re-encryption without random oracle. In: Proceedings of Provable Security 2009, pp 47–60

  8. Weng J, Yang Y, Tang Q, Deng RH, Bao F (2009) Efficient conditional proxy re-encryption with chosen-ciphertext security. In: Proceedings of the 12th Information Security Conference (ISC’09), 5735: pp 151–166

  9. Chu CK, Weng J, Chow SSM, Zhou J, Deng RH (2009) Conditional proxy broadcast re-encryption. In: Proceedings of the 14th Australasian Conference on Information Security and Privacy (ACISP’09), 5594: pp 327–342

  10. Wang B (2012) A Unidirectional Conditional Proxy Re-encryption Scheme Based on Non-Monotonic Access Structure. [Online]. Available: http://eprint.iacr.org/2012/641.pdf

  11. Zhao, J, Feng, D, Zhang Z (2010) Attribute-Based Conditional Proxy Re-Encryption with Chosen-Ciphertext Security. In: Proceedings of GLOBECOM, pp 1–6.

  12. Yang Y, Lu H, Weng J, et al. (2014) Fine-grained conditional proxy re-encryption and application. Provable Security:206–222

  13. Zhang X, Chen MR (2009) On the Security of a Conditional Proxy Re-Encryption. IEICE Trans Fundam Electron Commun Comput Sci 92(10):2644–2647

    Article  Google Scholar 

  14. Lan CH, Wang CF (2013). A new conditional proxy re-encryption scheme based on secret sharing. Journal of computer 36(4): 895–902 (in Chinese)

  15. Shamir A (1979) How to share a secret. Commun ACM 22(11):612–613

    Article  MathSciNet  MATH  Google Scholar 

  16. Isshiki T, Nguyen MH, Tanaka K (2013) Proxy re-encryption in a stronger security model extended from CT-RSA2012. Topics in Cryptology-CT-RSA, Springer Berlin Heidelberg: 277–292

Download references

Acknowledgments

This work is supported by the National Natural Science Foundation of China under Grants 61402197, 61472165 and 61272415.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yuxia Sun.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Sun, Y., Liu, D. Cryptanalysis on a Secret-Sharing Based Conditional Proxy Re-Encryption Scheme. Mobile Netw Appl 22, 209–215 (2017). https://doi.org/10.1007/s11036-016-0760-2

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-016-0760-2

Keywords

Navigation