Tracing Malicious Proxies in Proxy Re-Encryption

Abstract : In 1998, Blaze, Bleumer and Strauss put forth a cryptographic primitive, termed proxy re-encryption, where a semi-trusted proxy is given some piece of information that enables the re-encryption of ciphertexts from one key to another. Unidirectional schemes only allow translating from the delegator to the delegatee and not in the opposite direction. In all constructions described so far, although colluding proxies and delegatees cannot expose the delegator's long term secret, they can derive and disclose sub-keys that suffice to open all translatable ciphertexts sent to the delegator. They can also generate new re-encryption keys for receivers that are not trusted by the delegator. In this paper, we propose traceable proxy re-encryption systems, where proxies that leak their re-encryption key can be identified by the delegator. The primitive does not preclude illegal transfers of delegation but rather strives to deter them. We give security definitions for this new primitive and a construction meeting the formalized requirements. This construction is fairly efficient, with ciphertexts that have logarithmic size in the number of delegations, but uses a non-black-box tracing algorithm. We discuss how to provide the scheme with a black box tracing mechanism at the expense of longer ciphertexts.
Type de document :
Communication dans un congrès
S. Galbraith, T. Okamoto, K. Paterson. 2nd International Conference on Pairing-based Cryptography - Pairing 2008, Sep 2008, Egham, United Kingdom. Springer, 5209, pp.332-353, 2008, Lecture Notes in Computer Science. 〈10.1007/978-3-540-85538-5_22〉
Liste complète des métadonnées

Littérature citée [28 références]  Voir  Masquer  Télécharger

https://hal.inria.fr/inria-00327353
Contributeur : Damien Vergnaud <>
Soumis le : mercredi 8 octobre 2008 - 12:02:00
Dernière modification le : jeudi 11 janvier 2018 - 06:19:17
Document(s) archivé(s) le : jeudi 3 juin 2010 - 21:16:03

Fichiers

pairing08.pdf
Fichiers produits par l'(les) auteur(s)

Identifiants

Collections

PSL

Citation

Benoît Libert, Damien Vergnaud. Tracing Malicious Proxies in Proxy Re-Encryption. S. Galbraith, T. Okamoto, K. Paterson. 2nd International Conference on Pairing-based Cryptography - Pairing 2008, Sep 2008, Egham, United Kingdom. Springer, 5209, pp.332-353, 2008, Lecture Notes in Computer Science. 〈10.1007/978-3-540-85538-5_22〉. 〈inria-00327353〉

Partager

Métriques

Consultations de la notice

252

Téléchargements de fichiers

127