JP Journal of Algebra, Number Theory and Applications

The JP Journal of Algebra, Number Theory and Applications is a prestigious international journal indexed in the Emerging Sources Citation Index (ESCI). It publishes original research papers, both theoretical and applied in nature, in various branches of algebra and number theory. The journal also welcomes survey articles that contribute to the advancement of these fields.

Submit Article

DEVELOPMENT ON SECURITY MODELS FOR PROXY RE-ENCRYPTION SCHEMES

Authors

  • Mamadou Makhtar LO
  • Demba SOW
  • Mohamed Ben MAAOUIA

Keywords:

proxy re-encryption, security models, public keys encryption, access delegation, cryptography.

DOI:

https://doi.org/10.17654/0972555524001

Abstract

A proxy re-encryption is a type of public key encryption where a proxy is given the ability to transform ciphertext for one user into ciphertext for another user, without having access to either the plaintext or the decryption keys.

Proxy re-encryption schemes, since their introduction in 1998 by Blaze et al. [3], are often proposed with specific security notions. We propose here to recall the most commonly used security notions and to propose standard security models for security analysis of proxy re-encryption scheme.

In this article, we consider the goals of confidentiality and non-malleability, each in the context of a parametric family of attack models. For each of the resulting pairs of definitions, we prove either an implication or a separation from the other security definitions.

Received: September 1, 2023
Accepted: October 27, 2023

References

Giuseppe Ateniese, Kevin Fu, Matthew Green and Susan Hohenberger, Improved proxy re-encryption schemes with applications to secure distributed storage, ACM Transactions on Information and System Security (TISSEC) 9(1) (2006), 1-30.

Mihir Bellare, Anand Desai, David Pointcheval and Phillip Rogaway, Plaintext awareness, non-malleability, and chosen ciphertext security: implications and separations, Crypto 98 (1998), 26-45.

Matt Blaze, Gerrit Bleumer and Martin Strauss, Divertible protocols and atomic proxy cryptography, Kaisa Nyberg, ed., Advances in Cryptology — EUROCRYPT’98, Springer, Berlin, Heidelberg, 1998, pp. 127 144.

Sébastien Canard, Julien Devigne and Fabien Laguillaumie, Improving the security of an efficient unidirectional proxy re-encryption scheme, Journal of Internet Services and Information Security (2011), 140-160.

Ran Canetti, Universally composable security: a new paradigm for cryptographic protocols, Proceedings 42nd IEEE Symposium on Foundations of Computer Science, IEEE, 2001, pp. 136-145.

Ran Canetti and Susan Hohenberger, Chosen-ciphertext secure proxy re-encryption, Proceedings of the 14th ACM Conference on Computer and Communications Security, 2007, pp. 185-194.

Ran Canetti, Hugo Krawczyk and Jesper B. Nielsen, Relaxing chosen-ciphertext security, Advances in Cryptology-CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings 23, Springer, 2003, pp. 565-582.

Danny Dolev, Cynthia Dwork and Moni Naor, Non-malleable cryptography, Proceedings of the Twenty-third Annual ACM Symposium on Theory of Computing, 1991, pp. 542-552.

T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory 31(4) (1985), 469-472.

Chunpeng Ge, Willy Susilo, Liming Fang, Jiandong Wang and Yunqing Shi, A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system, Designs, Codes and Cryptography 86(11) (2018), 2587-2603.

Oded Goldreich, Shafi Goldwasser and Silvio Micali, How to construct random functions, Journal of the ACM (JACM) 33(4) (1986), 792-807.

Johan Håstad, Russell Impagliazzo, Leonid A. Levin and Michael Luby, A pseudorandom generator from any one-way function, SIAM Journal on Computing 28(4) (1999), 1364-1396.

Russell Impagliazzo and Michael Luby, One-way functions are essential for complexity based cryptography, 30th Annual Symposium on Foundations of Computer Science, IEEE Computer Society, 1989, pp. 230-235.

Anca-Andreea Ivan and Yevgeniy Dodis, Proxy cryptography revisited, NDSS, 2003.

Wei Luo and Wenping Ma, A secure revocable identity-based proxy re-encryption scheme for cloud storage, International Conference on Cloud Computing and Security, Springer, 2018, pp. 519-530.

Ahsan Manzoor, Madhsanka Liyanage, An Braeke, Salil S. Kanhere and Mika Ylianttila, Blockchain based proxy re-encryption scheme for secure IoT data sharing, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), IEEE, 2019, pp. 99-103.

David Nunez, Isaac Agudo and Javier Lopez, A parametric family of attack models for proxy re-encryption, 2015 IEEE 28th Computer Security Foundations Symposium, 2015, pp. 290-301.

Yuriy Polyakov, Kurt Rohloff, Gyana Sahu and Vinod Vaikuntanathan, Fast proxy re-encryption for publish/subscribe systems, ACM Transactions on Privacy and Security (TOPS) 20(4) (2017), 1-31.

Goldwasser Shafi and Micali Silvio, Probabilistic encryption, Journal of Computer and System Sciences 28(2) (1984), 270-299.

V. Vijayakumar, M. K. Priyan, Gandhi Ushadevi, R. Varatharajan, Gunasekaran Manogaran and Prathamesh Vijay Tarare, E-health cloud security using timing enabled proxy re-encryption, Mobile Networks and Applications 24(3) (2019), 1034-1045.

Peng Xu, Tengfei Jiao, Qianhong Wu, Wei Wang and Hai Jin, Conditional identity-based broadcast proxy re-encryption and its application to cloud email, IEEE Transactions on Computers 65(1) (2015), 66-79.

Published

2023-12-15

Issue

Section

Articles

How to Cite

DEVELOPMENT ON SECURITY MODELS FOR PROXY RE-ENCRYPTION SCHEMES. (2023). JP Journal of Algebra, Number Theory and Applications, 63(1), 1-21. https://doi.org/10.17654/0972555524001