Skip to main content
Article
On the security of two identity-based conditional proxy re-encryption schemes
Theoretical Computer Science
  • Kai HE, Jinan University - China
  • Jian WENG, Jinan University - China
  • Robert H. DENG, Singapore Management University
  • Joseph K. LIU, Monash University
Publication Type
Journal Article
Version
publishedVersion
Publication Date
11-2016
Abstract

Proxy re-encryption allows a semi-trusted proxy with a re-encryption key to convert a delegator's ciphertext into a delegatee's ciphertext, and the semi-trusted proxy cannot learn anything about the underlying plaintext. If a proxy re-encryption scheme is indistinguishable against chosen-ciphertext attacks, its initialized ciphertext should be non-malleable. Otherwise, there might exist an adversary who can break the chosen-ciphertext security of the scheme. Recently, Liang et al. proposed two proxy re-encryption schemes. They claimed that their schemes were chosen-ciphertext secure in the standard model. However, we find that the original ciphertext in their schemes are malleable. Thus, we present some concrete attacks and indicate their schemes fail to achieve chosen-ciphertext security in the standard model.

Keywords
  • Conditional proxy re-encryption,
  • Identity-based,
  • Single hop,
  • Multi-hop,
  • Chosen-ciphertext security
Identifier
10.1016/j.tcs.2016.08.023
Publisher
Elsevier
Creative Commons License
Creative Commons Attribution-NonCommercial-No Derivative Works 4.0 International
Additional URL
https://doi.org/10.1016/j.tcs.2016.08.023
Citation Information
Kai HE, Jian WENG, Robert H. DENG and Joseph K. LIU. "On the security of two identity-based conditional proxy re-encryption schemes" Theoretical Computer Science Vol. 652 (2016) p. 18 - 27 ISSN: 0304-3975
Available at: http://works.bepress.com/robert-deng/245/