University of Wollongong
Browse

Efficient and fully CCA secure conditional proxy re-encryption from hierarchical identity-based encryption

journal contribution
posted on 2024-11-16, 09:03 authored by Kaitai Liang, Willy SusiloWilly Susilo, Joseph K Liu, Duncan Wong
A Proxy Re-Encryption (PRE) allows a data owner to delegate the decryption rights of some encrypted data stored on the cloud without revealing the data to an honest-but-curious cloud service provider (i.e. the PRE proxy). Furthermore, the data owner can offload most of the computational operations to the cloud service provider and hence, using PRE for encrypted cloud data sharing can be very effective even for data owners using limited resource devices (e.g. mobile devices). However, PRE schemes only enables data owners to delegate the decryption rights of all their encrypted data. A more practical notion is a Conditional PRE (CPRE) that allows us to specify under what condition the decryption of an encrypted data can be delegated, for example, only sharing all the encrypted files under a directory called \public". In this paper, we provide an affirrmative result on the long-standing question of building a full CCA-secure CPRE system in the standard model and for the first time, we show that a class of Hierarchical Identity-Based Encryption (HIBE) schemes can be transferred to building a CCA-secure CPRE in the standard model. We also list out some concrete HIBE schemes which fall into this class, e.g., Lewko-Waters HIBE. All existing CCA-secure PRE schemes in the standard model are not conditional while all existing CPRE schemes are either not CCA-secure or not in the standard model. By instantiating our generic HIBE-based transformation, we show that an effcient and concrete CPRE scheme which is both CCA secure in the standard model and conditional can be built.

Funding

Sequential attribute-based encryption: new cryptographic framework, constructions and applications towards cloud security

Australian Research Council

Find out more...

History

Citation

Liang, K., Susilo, W., Liu, J. K. & Wong, D. S. (2015). Efficient and fully CCA secure conditional proxy re-encryption from hierarchical identity-based encryption. The Computer Journal, 58 (10), 2778-2792.

Journal title

Computer Journal

Volume

58

Issue

10

Pagination

2778-2792

Language

English

RIS ID

101455

Usage metrics

    Categories

    Keywords

    Exports

    RefWorks
    BibTeX
    Ref. manager
    Endnote
    DataCite
    NLM
    DC