首页> 外文会议>International Conference on Cryptology and Information Security in Latin America >Improved Security Notions for Proxy Re-Encryption to Enforce Access Control
【24h】

Improved Security Notions for Proxy Re-Encryption to Enforce Access Control

机译:改进了代理重新加密的安全概念来强制访问控制

获取原文

摘要

Proxy Re-Encryption (PRE) allows a ciphertext encrypted under Alice's public key to be transformed to an encryption under Bob's public key without revealing either the plaintext or the decryption keys. PRE schemes have clear applications to cryptographic access control by allowing outsourced data to be selectively shared to users via reencryption to appropriate keys. One concern for this application is that the server should not be able to perform unauthorised re-encryptions. We argue that current security notions do not adequately address this concern. We revisit existing definitions for PRE, starting by challenging the concept of unidirectionality, which states that re-encryption tokens from A to B cannot be used to re-encrypt from B to A. We strengthen this definition to reflect realistic scenarios in which adversaries may try to reverse a re-encryption by retaining information about prior ciphertexts and re-encryption tokens. We then strengthen the adversarial model to consider malicious adversaries that may collude with corrupt users and attempt to perform unauthorised re-encryptions; this models a malicious cloud service provider aiming to subvert the re-encryption process to leak sensitive data. Finally we revisit the notion of authenticated encryption for PRE. This currently assumes the same party who created the message also encrypted it, which is not necessarily the case in re-encryption. We thus introduce the notion of ciphertext origin authentication to determine who encrypted the message (initiated a re-encryption) and show how to fufil this requirement in practice.
机译:代理重新加密(PRE)允许在Alice的公钥下加密的密文在Bob公钥下的加密中转换,而不会显示明文或解密密钥。预先计划通过允许通过reencryption选择性地共享给用户来对加密访问控制来清除加密访问控制。对此应用程序的一个问题是服务器不应该能够执行未经授权的重新加密。我们认为当前的安全概念不会充分解决这一问题。我们通过挑战单向性的概念来重新开始前面的现有定义,这些定义是从A到B的重新加密令牌不能用于从B到A重新加密。我们加强了这种定义,反映了对手可能的现实情景尝试通过保留有关先前密文和重新加密令牌的信息来反转重新加密。然后,我们加强对抗的模型,以考虑可能与腐败用户丛生的恶意对手,并尝试执行未经授权的重新加密;这模拟了恶意云服务提供商,旨在颠覆重新加密过程以泄漏敏感数据。最后,我们重新审视预先验证的加密的概念。这目前假设创建该消息的同一方也加密了它,这不一定是重新加密的情况。因此,我们介绍了密文源认证的概念,以确定谁加密消息(启动重新加密)并显示如何在实践中进行这种要求。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号