首页> 外文会议>International Conference on Cloud Security Management >Proxy Impersonation Safe Conditional Proxy Re-Encryption
【24h】

Proxy Impersonation Safe Conditional Proxy Re-Encryption

机译:代理模拟安全条件代理重新加密

获取原文

摘要

Proxy Re-Encryption (PRE) allows a proxy to convert a ciphertext encrypted under the public key of a user A to a ciphertext encrypted under the public key of another user B, without knowing the plaintext. If A wishes that encrypted message (under his public key) in the cloud be accessible / readable to another user B, then a protocol involving A, B and proxy is run to generate re-encryption key. Proxy may now convert any message encrypted under the key of A to the another ciphertext encrypted under the key of B. In order to prevent the proxy from converting all the encrypted messages, the notion of Conditional Proxy Re-encryption (CPRE) was introduced in the literature. In CPRE, the user A specifies not only the target user B, but also the type of messages that the proxy is allowed to re-encrypt for B. One obvious security requirement for such a scheme is that the proxy should not be able to obtain the secret key of A or B by colluding with B or A respectively. Designing a collusion resistant CPRE is an interesting and challenging task. While the existing ID based CPRE schemes have the collusion resistance property, they lack another important security requirement which we refer as the Proxy Impersonation (PI). Suppose, B gets a re-encrypted ciphertext through a proxy. If this enables B to convert this encrypted message from A to another message for user C (without the involvement of proxy or A), then B is said to Impersonate the proxy. If such an impersonation is possible, then that would lead to distribution rights violation of encrypted contents, specifically, in the context of media content streaming and networked file storage on cloud. We first show that the existing ID based CPRE scheme suffers from Proxy Impersonation weakness. Then, we move to the design of a novel ID based CPRE that is secure against Proxy Impersonation. We formally prove the security property in random oracle model.
机译:代理重新加密(pre)允许代理将在用户A的公钥下加密的密文转换为在另一个用户B的公钥下加密的密文,而不知道明文。如果希望在云中访问云中的加密消息(在他的公钥下),则可以访问另一个用户B,然后运行涉及A,B和代理的协议以生成重新加密密钥。代理现在可以在B的键下加密的另一个密文中加密的任何消息转换为B的另一个密文。为了防止代理转换所有加密消息,引入了条件代理重新加密(CPRE)的概念文献。在CPRE中,用户A不仅指定目标用户B,而且指定代理被允许重新加密B的消息类型。这种方案的一个明显的安全要求是代理不应该获得分别与B或A勾结A或B的秘密键。设计抗性CPRE是一个有趣和具有挑战性的任务。虽然现有的基于ID的CPRE方案具有崩溃的阻力性,但它们缺乏另一种重要的安全要求,我们将作为代理模拟(PI)所说的。假设,B通过代理获得重新加密的密文。如果这使得B能够将此加密的消息从A转换为用户C的另一个消息(而不参与代理或A),则据说B旨在模拟代理。如果可能是这种模拟,那么这将导致分发权限违反加密内容,具体地,在云媒体内容流和网络文件存储的上下文中。首先表明现有的基于ID的CPRE方案遭受了代理模拟的弱点。然后,我们转向设计基于ID的CPRE,这是对代理模拟的安全。我们正式证明了随机Oracle模型中的安全性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号