TY - JOUR
T1 - On the security of two identity-based conditional proxy re-encryption schemes
AU - He, Kai
AU - Weng, Jian
AU - Deng, Robert H.
AU - Liu, Joseph K.
PY - 2016
Y1 - 2016
N2 - Proxy re-encryption allows a semi-trusted proxy with a re-encryption key to convert a delegator's ciphertext into a delegatee's ciphertext, and the semi-trusted proxy cannot learn anything about the underlying plaintext. If a proxy re-encryption scheme is indistinguishable against chosen-ciphertext attacks, its initialized ciphertext should be non-malleable. Otherwise, there might exist an adversary who can break the chosen-ciphertext security of the scheme. Recently, Liang et al. proposed two proxy re-encryption schemes. They claimed that their schemes were chosen-ciphertext secure in the standard model. However, we find that the original ciphertext in their schemes are malleable. Thus, we present some concrete attacks and indicate their schemes fail to achieve chosen-ciphertext security in the standard model. © 2016
AB - Proxy re-encryption allows a semi-trusted proxy with a re-encryption key to convert a delegator's ciphertext into a delegatee's ciphertext, and the semi-trusted proxy cannot learn anything about the underlying plaintext. If a proxy re-encryption scheme is indistinguishable against chosen-ciphertext attacks, its initialized ciphertext should be non-malleable. Otherwise, there might exist an adversary who can break the chosen-ciphertext security of the scheme. Recently, Liang et al. proposed two proxy re-encryption schemes. They claimed that their schemes were chosen-ciphertext secure in the standard model. However, we find that the original ciphertext in their schemes are malleable. Thus, we present some concrete attacks and indicate their schemes fail to achieve chosen-ciphertext security in the standard model. © 2016
KW - Conditional proxy re-encryption
KW - Identity-based
KW - Single hop
KW - Multi-hop
KW - Chosen-ciphertext security
UR - http://www.scopus.com/inward/record.url?scp=84992660454&partnerID=8YFLogxK
U2 - 10.1016/j.tcs.2016.08.023
DO - 10.1016/j.tcs.2016.08.023
M3 - Article
SN - 0304-3975
VL - 652
SP - 18
EP - 27
JO - Theoretical Computer Science
JF - Theoretical Computer Science
ER -