TY - GEN
T1 - Strong Post-Compromise Secure Proxy Re-Encryption
AU - Davidson, Alex
AU - Deo, Amit
AU - Lee, Ela
AU - Martin, Keith
PY - 2019/5/30
Y1 - 2019/5/30
N2 - Proxy Re-Encryption (PRE) allows a ciphertext encrypted using a key to be re-encrypted by a third party so that it is an encryption of the same message under a new key, without revealing the message. We define Post-Compromise Security (PCS) in the context of PRE. This ensures that an adversary cannot distinguish which of two adversarially chosen ciphertexts a re-encryption was created from even when given the old secret key and the update token used to perform the re-encryption. We give separating examples demonstrating how PCS is stronger than existing security definitions for PRE achieving similar goals, before showing that PCS can be achieved using a combination of existing security properties from the literature. In doing so, we show there are existing PRE schemes satisfying PCS. Finally, we give a construction demonstrating that natural modifications of practical PRE schemes provably have PCS directly, without incurring overheads from the security reductions we have shown, and from weaker assumptions than existing schemes.
AB - Proxy Re-Encryption (PRE) allows a ciphertext encrypted using a key to be re-encrypted by a third party so that it is an encryption of the same message under a new key, without revealing the message. We define Post-Compromise Security (PCS) in the context of PRE. This ensures that an adversary cannot distinguish which of two adversarially chosen ciphertexts a re-encryption was created from even when given the old secret key and the update token used to perform the re-encryption. We give separating examples demonstrating how PCS is stronger than existing security definitions for PRE achieving similar goals, before showing that PCS can be achieved using a combination of existing security properties from the literature. In doing so, we show there are existing PRE schemes satisfying PCS. Finally, we give a construction demonstrating that natural modifications of practical PRE schemes provably have PCS directly, without incurring overheads from the security reductions we have shown, and from weaker assumptions than existing schemes.
UR - http://www.scopus.com/inward/record.url?scp=85068641714&partnerID=8YFLogxK
U2 - 10.1007/978-3-030-21548-4_4
DO - 10.1007/978-3-030-21548-4_4
M3 - Conference contribution
AN - SCOPUS:85068641714
SN - 978-3-030-21547-7
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 58
EP - 77
BT - Information Security and Privacy - 24th Australasian Conference, ACISP 2019, Proceedings
A2 - Jang-Jaccard, Julian
A2 - Guo, Fuchun
PB - Springer-Verlag
T2 - 24th Australasian Conference on Information Security and Privacy, ACISP 2019
Y2 - 3 July 2019 through 5 July 2019
ER -