Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2014

AUTHORS

Kunwar Singh , C. Pandu Rangan , A. K. Banerjee

ABSTRACT

At Eurocrypt 1998, Blaze, Bleumer and Strauss [7]presented a new primitive called Proxy Re-Encryption (PRE). This new primitive allows semi trusted proxy to transform a ciphertext for Alice (delegator) into a ciphertext for Bob (delegatee) without knowing the message. Ateniese et al [6] introduced master secret security as another security requirement for unidirectional PRE. Master secret security demands that no coalition of dishonest proxy and malicious delegatees can compute the master secret key (private key) of the delegator. In this paper, first we have shown that Aono et al’s scheme [4] is not secure under master secret security model. In other words if proxy and delegatee collude they can compute the private key of the delegator. Second, based on Aono et al’s paper [4] we have constructed unidirectional PRE which is also secure under master secret security model. Like [4], our scheme is also multi-use. More... »

PAGES

564-575

References to SciGraph publications

  • 2011. Better Key Sizes (and Attacks) for LWE-Based Encryption in TOPICS IN CRYPTOLOGY – CT-RSA 2011
  • 2013. Key-Private Proxy Re-encryption under LWE in PROGRESS IN CRYPTOLOGY – INDOCRYPT 2013
  • 2002. Complexity of Lattice Problems, A Cryptographic Perspective in NONE
  • 2009. Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems in ADVANCES IN CRYPTOLOGY - CRYPTO 2009
  • 2011-04. Generating Shorter Bases for Hard Random Lattices in THEORY OF COMPUTING SYSTEMS
  • 1998. Divertible protocols and atomic proxy cryptography in ADVANCES IN CRYPTOLOGY — EUROCRYPT'98
  • 2010. Efficient Lattice (H)IBE in the Standard Model in ADVANCES IN CRYPTOLOGY – EUROCRYPT 2010
  • Book

    TITLE

    Information and Communication Technology

    ISBN

    978-3-642-55031-7
    978-3-642-55032-4

    Identifiers

    URI

    http://scigraph.springernature.com/pub.10.1007/978-3-642-55032-4_58

    DOI

    http://dx.doi.org/10.1007/978-3-642-55032-4_58

    DIMENSIONS

    https://app.dimensions.ai/details/publication/pub.1022282546


    Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
    Incoming Citations Browse incoming citations for this publication using opencitations.net

    JSON-LD is the canonical representation for SciGraph data.

    TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

    [
      {
        "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
        "about": [
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Data Format", 
            "type": "DefinedTerm"
          }, 
          {
            "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
            "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
            "name": "Information and Computing Sciences", 
            "type": "DefinedTerm"
          }
        ], 
        "author": [
          {
            "affiliation": {
              "alternateName": "National Institute of Technology Tiruchirappalli", 
              "id": "https://www.grid.ac/institutes/grid.419653.c", 
              "name": [
                "Computer Science and Engineering Department, NIT Trichy, Tiruchirappalli, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Singh", 
            "givenName": "Kunwar", 
            "id": "sg:person.012446762427.04", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012446762427.04"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "name": [
                "Computer Science and Engineering Department, IIT, Madras, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Rangan", 
            "givenName": "C. Pandu", 
            "id": "sg:person.016366027737.61", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016366027737.61"
            ], 
            "type": "Person"
          }, 
          {
            "affiliation": {
              "alternateName": "National Institute of Technology Tiruchirappalli", 
              "id": "https://www.grid.ac/institutes/grid.419653.c", 
              "name": [
                "Mathematics Department, NIT Trichy, Tiruchirappalli, India"
              ], 
              "type": "Organization"
            }, 
            "familyName": "Banerjee", 
            "givenName": "A. K.", 
            "id": "sg:person.015743327233.21", 
            "sameAs": [
              "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015743327233.21"
            ], 
            "type": "Person"
          }
        ], 
        "citation": [
          {
            "id": "sg:pub.10.1007/978-3-319-03515-4_1", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1000963163", 
              "https://doi.org/10.1007/978-3-319-03515-4_1"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/bfb0054122", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1003048532", 
              "https://doi.org/10.1007/bfb0054122"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13190-5_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006227741", 
              "https://doi.org/10.1007/978-3-642-13190-5_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-13190-5_28", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006227741", 
              "https://doi.org/10.1007/978-3-642-13190-5_28"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/237814.237838", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1006748772"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/s00224-010-9278-3", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1010934851", 
              "https://doi.org/10.1007/s00224-010-9278-3"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1060590.1060603", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1012332159"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-19074-2_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013434615", 
              "https://doi.org/10.1007/978-3-642-19074-2_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-19074-2_21", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1013434615", 
              "https://doi.org/10.1007/978-3-642-19074-2_21"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1145/1127345.1127346", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1015718628"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://app.dimensions.ai/details/publication/pub.1027648934", 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-1-4615-0897-7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027648934", 
              "https://doi.org/10.1007/978-1-4615-0897-7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-1-4615-0897-7", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1027648934", 
              "https://doi.org/10.1007/978-1-4615-0897-7"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "sg:pub.10.1007/978-3-642-03356-8_35", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1053603939", 
              "https://doi.org/10.1007/978-3-642-03356-8_35"
            ], 
            "type": "CreativeWork"
          }, 
          {
            "id": "https://doi.org/10.1137/s0097539795293172", 
            "sameAs": [
              "https://app.dimensions.ai/details/publication/pub.1062880065"
            ], 
            "type": "CreativeWork"
          }
        ], 
        "datePublished": "2014", 
        "datePublishedReg": "2014-01-01", 
        "description": "At Eurocrypt 1998, Blaze, Bleumer and Strauss [7]presented a new primitive called Proxy Re-Encryption (PRE). This new primitive allows semi trusted proxy to transform a ciphertext for Alice (delegator) into a ciphertext for Bob (delegatee) without knowing the message. Ateniese et al [6] introduced master secret security as another security requirement for unidirectional PRE. Master secret security demands that no coalition of dishonest proxy and malicious delegatees can compute the master secret key (private key) of the delegator. In this paper, first we have shown that Aono et al\u2019s scheme [4] is not secure under master secret security model. In other words if proxy and delegatee collude they can compute the private key of the delegator. Second, based on Aono et al\u2019s paper [4] we have constructed unidirectional PRE which is also secure under master secret security model. Like [4], our scheme is also multi-use.", 
        "editor": [
          {
            "familyName": "Linawati", 
            "type": "Person"
          }, 
          {
            "familyName": "Mahendra", 
            "givenName": "Made Sudiana", 
            "type": "Person"
          }, 
          {
            "familyName": "Neuhold", 
            "givenName": "Erich J.", 
            "type": "Person"
          }, 
          {
            "familyName": "Tjoa", 
            "givenName": "A Min", 
            "type": "Person"
          }, 
          {
            "familyName": "You", 
            "givenName": "Ilsun", 
            "type": "Person"
          }
        ], 
        "genre": "chapter", 
        "id": "sg:pub.10.1007/978-3-642-55032-4_58", 
        "inLanguage": [
          "en"
        ], 
        "isAccessibleForFree": true, 
        "isPartOf": {
          "isbn": [
            "978-3-642-55031-7", 
            "978-3-642-55032-4"
          ], 
          "name": "Information and Communication Technology", 
          "type": "Book"
        }, 
        "name": "Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme", 
        "pagination": "564-575", 
        "productId": [
          {
            "name": "doi", 
            "type": "PropertyValue", 
            "value": [
              "10.1007/978-3-642-55032-4_58"
            ]
          }, 
          {
            "name": "readcube_id", 
            "type": "PropertyValue", 
            "value": [
              "6a289dfdfbe8569b7a4cadc0274bfe1f39c64274cca90445f6cc337e7318d0ca"
            ]
          }, 
          {
            "name": "dimensions_id", 
            "type": "PropertyValue", 
            "value": [
              "pub.1022282546"
            ]
          }
        ], 
        "publisher": {
          "location": "Berlin, Heidelberg", 
          "name": "Springer Berlin Heidelberg", 
          "type": "Organisation"
        }, 
        "sameAs": [
          "https://doi.org/10.1007/978-3-642-55032-4_58", 
          "https://app.dimensions.ai/details/publication/pub.1022282546"
        ], 
        "sdDataset": "chapters", 
        "sdDatePublished": "2019-04-15T23:51", 
        "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
        "sdPublisher": {
          "name": "Springer Nature - SN SciGraph project", 
          "type": "Organization"
        }, 
        "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8697_00000257.jsonl", 
        "type": "Chapter", 
        "url": "http://link.springer.com/10.1007/978-3-642-55032-4_58"
      }
    ]
     

    Download the RDF metadata as:  json-ld nt turtle xml License info

    HOW TO GET THIS DATA PROGRAMMATICALLY:

    JSON-LD is a popular format for linked data which is fully compatible with JSON.

    curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-55032-4_58'

    N-Triples is a line-based linked data format ideal for batch operations.

    curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-55032-4_58'

    Turtle is a human-readable linked data format.

    curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-55032-4_58'

    RDF/XML is a standard XML format for linked data.

    curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-55032-4_58'


     

    This table displays all metadata directly associated to this object as RDF triples.

    143 TRIPLES      23 PREDICATES      39 URIs      20 LITERALS      8 BLANK NODES

    Subject Predicate Object
    1 sg:pub.10.1007/978-3-642-55032-4_58 schema:about anzsrc-for:08
    2 anzsrc-for:0804
    3 schema:author N49ecfb48d39641409cb87621a5c31a2b
    4 schema:citation sg:pub.10.1007/978-1-4615-0897-7
    5 sg:pub.10.1007/978-3-319-03515-4_1
    6 sg:pub.10.1007/978-3-642-03356-8_35
    7 sg:pub.10.1007/978-3-642-13190-5_28
    8 sg:pub.10.1007/978-3-642-19074-2_21
    9 sg:pub.10.1007/bfb0054122
    10 sg:pub.10.1007/s00224-010-9278-3
    11 https://app.dimensions.ai/details/publication/pub.1027648934
    12 https://doi.org/10.1137/s0097539795293172
    13 https://doi.org/10.1145/1060590.1060603
    14 https://doi.org/10.1145/1127345.1127346
    15 https://doi.org/10.1145/237814.237838
    16 schema:datePublished 2014
    17 schema:datePublishedReg 2014-01-01
    18 schema:description At Eurocrypt 1998, Blaze, Bleumer and Strauss [7]presented a new primitive called Proxy Re-Encryption (PRE). This new primitive allows semi trusted proxy to transform a ciphertext for Alice (delegator) into a ciphertext for Bob (delegatee) without knowing the message. Ateniese et al [6] introduced master secret security as another security requirement for unidirectional PRE. Master secret security demands that no coalition of dishonest proxy and malicious delegatees can compute the master secret key (private key) of the delegator. In this paper, first we have shown that Aono et al’s scheme [4] is not secure under master secret security model. In other words if proxy and delegatee collude they can compute the private key of the delegator. Second, based on Aono et al’s paper [4] we have constructed unidirectional PRE which is also secure under master secret security model. Like [4], our scheme is also multi-use.
    19 schema:editor N30899d932a4c40ccabe9fdb2bba107dc
    20 schema:genre chapter
    21 schema:inLanguage en
    22 schema:isAccessibleForFree true
    23 schema:isPartOf N093971779c1c4bff9b01726ba0de3dc7
    24 schema:name Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme
    25 schema:pagination 564-575
    26 schema:productId N827560cec78545b6849f5727cd0ce5dc
    27 Nc777cb15eac641d08393bc0e57a6b40c
    28 Nff6453c8f2804eabb51e704b7e865c09
    29 schema:publisher N7651517b51f24bfba16ecb59b5343646
    30 schema:sameAs https://app.dimensions.ai/details/publication/pub.1022282546
    31 https://doi.org/10.1007/978-3-642-55032-4_58
    32 schema:sdDatePublished 2019-04-15T23:51
    33 schema:sdLicense https://scigraph.springernature.com/explorer/license/
    34 schema:sdPublisher N877c9fb03f974545b80d123a189f089c
    35 schema:url http://link.springer.com/10.1007/978-3-642-55032-4_58
    36 sgo:license sg:explorer/license/
    37 sgo:sdDataset chapters
    38 rdf:type schema:Chapter
    39 N093971779c1c4bff9b01726ba0de3dc7 schema:isbn 978-3-642-55031-7
    40 978-3-642-55032-4
    41 schema:name Information and Communication Technology
    42 rdf:type schema:Book
    43 N0ed26f1ca9aa40318b649c370264fec2 schema:name Computer Science and Engineering Department, IIT, Madras, India
    44 rdf:type schema:Organization
    45 N24a791bb363849f29d1cb16a877e8942 rdf:first N314046a6c4634e4b8cee4812e65dcec7
    46 rdf:rest N2f093daa4d5e48228661ff4173e5d07d
    47 N2f093daa4d5e48228661ff4173e5d07d rdf:first Nbb96fed5fd09450893e538fb863f24ed
    48 rdf:rest rdf:nil
    49 N30899d932a4c40ccabe9fdb2bba107dc rdf:first N867eb35a12e84577b3b358c8ffafa0ab
    50 rdf:rest N55016052bc04413daaf6af3f9fdef72c
    51 N314046a6c4634e4b8cee4812e65dcec7 schema:familyName Tjoa
    52 schema:givenName A Min
    53 rdf:type schema:Person
    54 N49ecfb48d39641409cb87621a5c31a2b rdf:first sg:person.012446762427.04
    55 rdf:rest N76ca0759593b4dd196b6845d238b9d5f
    56 N55016052bc04413daaf6af3f9fdef72c rdf:first Nc10710e9f2b04b18833cbccf81ba339f
    57 rdf:rest N972072c632b3488ca3bc61fdbd357139
    58 N7651517b51f24bfba16ecb59b5343646 schema:location Berlin, Heidelberg
    59 schema:name Springer Berlin Heidelberg
    60 rdf:type schema:Organisation
    61 N76ca0759593b4dd196b6845d238b9d5f rdf:first sg:person.016366027737.61
    62 rdf:rest Nc7bc95a1d44148c48cee88c023e528f5
    63 N827560cec78545b6849f5727cd0ce5dc schema:name doi
    64 schema:value 10.1007/978-3-642-55032-4_58
    65 rdf:type schema:PropertyValue
    66 N867eb35a12e84577b3b358c8ffafa0ab schema:familyName Linawati
    67 rdf:type schema:Person
    68 N877c9fb03f974545b80d123a189f089c schema:name Springer Nature - SN SciGraph project
    69 rdf:type schema:Organization
    70 N972072c632b3488ca3bc61fdbd357139 rdf:first Nd517c217b6d94465b82c24fc422cbb0b
    71 rdf:rest N24a791bb363849f29d1cb16a877e8942
    72 Nbb96fed5fd09450893e538fb863f24ed schema:familyName You
    73 schema:givenName Ilsun
    74 rdf:type schema:Person
    75 Nc10710e9f2b04b18833cbccf81ba339f schema:familyName Mahendra
    76 schema:givenName Made Sudiana
    77 rdf:type schema:Person
    78 Nc777cb15eac641d08393bc0e57a6b40c schema:name readcube_id
    79 schema:value 6a289dfdfbe8569b7a4cadc0274bfe1f39c64274cca90445f6cc337e7318d0ca
    80 rdf:type schema:PropertyValue
    81 Nc7bc95a1d44148c48cee88c023e528f5 rdf:first sg:person.015743327233.21
    82 rdf:rest rdf:nil
    83 Nd517c217b6d94465b82c24fc422cbb0b schema:familyName Neuhold
    84 schema:givenName Erich J.
    85 rdf:type schema:Person
    86 Nff6453c8f2804eabb51e704b7e865c09 schema:name dimensions_id
    87 schema:value pub.1022282546
    88 rdf:type schema:PropertyValue
    89 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
    90 schema:name Information and Computing Sciences
    91 rdf:type schema:DefinedTerm
    92 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
    93 schema:name Data Format
    94 rdf:type schema:DefinedTerm
    95 sg:person.012446762427.04 schema:affiliation https://www.grid.ac/institutes/grid.419653.c
    96 schema:familyName Singh
    97 schema:givenName Kunwar
    98 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012446762427.04
    99 rdf:type schema:Person
    100 sg:person.015743327233.21 schema:affiliation https://www.grid.ac/institutes/grid.419653.c
    101 schema:familyName Banerjee
    102 schema:givenName A. K.
    103 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.015743327233.21
    104 rdf:type schema:Person
    105 sg:person.016366027737.61 schema:affiliation N0ed26f1ca9aa40318b649c370264fec2
    106 schema:familyName Rangan
    107 schema:givenName C. Pandu
    108 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.016366027737.61
    109 rdf:type schema:Person
    110 sg:pub.10.1007/978-1-4615-0897-7 schema:sameAs https://app.dimensions.ai/details/publication/pub.1027648934
    111 https://doi.org/10.1007/978-1-4615-0897-7
    112 rdf:type schema:CreativeWork
    113 sg:pub.10.1007/978-3-319-03515-4_1 schema:sameAs https://app.dimensions.ai/details/publication/pub.1000963163
    114 https://doi.org/10.1007/978-3-319-03515-4_1
    115 rdf:type schema:CreativeWork
    116 sg:pub.10.1007/978-3-642-03356-8_35 schema:sameAs https://app.dimensions.ai/details/publication/pub.1053603939
    117 https://doi.org/10.1007/978-3-642-03356-8_35
    118 rdf:type schema:CreativeWork
    119 sg:pub.10.1007/978-3-642-13190-5_28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006227741
    120 https://doi.org/10.1007/978-3-642-13190-5_28
    121 rdf:type schema:CreativeWork
    122 sg:pub.10.1007/978-3-642-19074-2_21 schema:sameAs https://app.dimensions.ai/details/publication/pub.1013434615
    123 https://doi.org/10.1007/978-3-642-19074-2_21
    124 rdf:type schema:CreativeWork
    125 sg:pub.10.1007/bfb0054122 schema:sameAs https://app.dimensions.ai/details/publication/pub.1003048532
    126 https://doi.org/10.1007/bfb0054122
    127 rdf:type schema:CreativeWork
    128 sg:pub.10.1007/s00224-010-9278-3 schema:sameAs https://app.dimensions.ai/details/publication/pub.1010934851
    129 https://doi.org/10.1007/s00224-010-9278-3
    130 rdf:type schema:CreativeWork
    131 https://app.dimensions.ai/details/publication/pub.1027648934 schema:CreativeWork
    132 https://doi.org/10.1137/s0097539795293172 schema:sameAs https://app.dimensions.ai/details/publication/pub.1062880065
    133 rdf:type schema:CreativeWork
    134 https://doi.org/10.1145/1060590.1060603 schema:sameAs https://app.dimensions.ai/details/publication/pub.1012332159
    135 rdf:type schema:CreativeWork
    136 https://doi.org/10.1145/1127345.1127346 schema:sameAs https://app.dimensions.ai/details/publication/pub.1015718628
    137 rdf:type schema:CreativeWork
    138 https://doi.org/10.1145/237814.237838 schema:sameAs https://app.dimensions.ai/details/publication/pub.1006748772
    139 rdf:type schema:CreativeWork
    140 https://www.grid.ac/institutes/grid.419653.c schema:alternateName National Institute of Technology Tiruchirappalli
    141 schema:name Computer Science and Engineering Department, NIT Trichy, Tiruchirappalli, India
    142 Mathematics Department, NIT Trichy, Tiruchirappalli, India
    143 rdf:type schema:Organization
     




    Preview window. Press ESC to close (or click here)


    ...