首页> 外文会议>IEEE Computer Security Foundations Symposium >A Parametric Family of Attack Models for Proxy Re-encryption
【24h】

A Parametric Family of Attack Models for Proxy Re-encryption

机译:用于代理重新加密的参数化攻击模型系列

获取原文

摘要

Proxy Re-Encryption (PRE) is a type of Public-Key Encryption (PKE) that provides an additional re-encryption functionality. Although PRE is inherently more complex than PKE, attack models for PRE have not been developed further than those inherited from PKE. In this paper we address this gap and define a parametric family of attack models for PRE, based on the availability of both the decryption and re-encryption oracles during the security game. This family enables the definition of a set of intermediate security notions for PRE that ranges from "plain" IND-CPA to "full" IND-CCA. We analyze some relations among these notions of security, and in particular, the separations that arise when the re-encryption oracle leaks re-encryption keys. In addition, we discuss which of these security notions represent meaningful adversarial models for PRE. Finally, we provide an example of a recent "CCA1-secure" scheme from PKC 2014 whose security model does not capture chosen-cipher text attacks through re-encryption and for which we describe an attack under a more realistic security notion. This attack emphasizes the fact that PRE schemes that leak re-encryption keys cannot achieve strong security notions.
机译:代理重新加密(PRE)是一种公共密钥加密(PKE),它提供了额外的重新加密功能。尽管PRE本质上比PKE复杂,但是针对PRE的攻击模型没有比从PKE继承的模型进一步开发。在本文中,我们基于安全性游戏期间解密和重新加密预言文件的可用性,解决了这一空白并定义了PRE的参数化攻击模型系列。该族可以为PRE定义一组中间安全性概念,范围从“普通” IND-CPA到“完整” IND-CCA。我们分析了这些安全性概念之间的某些关系,尤其是当重新加密Oracle泄漏重新加密密钥时出现的分离。此外,我们讨论了这些安全概念中的哪一个代表PRE的有意义的对抗模型。最后,我们提供了PKC 2014中最新的“ CCA1安全”方案的示例,该方案的安全模型无法通过重新加密捕获选定的密文攻击,并且我们将其描述为一种更现实的安全概念。这种攻击强调了一个事实,即泄漏重新加密密钥的PRE方案无法实现强大的安全性概念。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号