University of Surrey

Test tubes in the lab Research in the ATI Dance Research

Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption

Liang, Kaitai, Susilo, Willy, Liu, Joseph K and Wong, Duncan S (2015) Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption Computer Journal Section D: Security in Computer Systems and Networks, 58 (10). pp. 2778-2792.

Full text not available from this repository.


A proxy re-encryption (PRE) allows a data owner to delegate the decryption rights of some encrypted data stored on the cloud without revealing the data to an honest-but-curious cloud service provider (i.e. the PRE proxy). Furthermore, the data owner can offload most of the computational operations to the cloud service provider and hence, using PRE for encrypted cloud data sharing can be very effective even for data owners using limited resource devices (e.g. mobile devices). However, PRE schemes only enables data owners to delegate the decryption rights of all their encrypted data. A more practical notion is a conditional PRE (CPRE) that allows us to specify under what condition the decryption of an encrypted data can be delegated, for example, only sharing all the encrypted files under a directory called ‘public’. In this paper, we provide an affirmative result on the long-standing question of building a full chosen-ciphertext attacks (CCA)-secure CPRE system in the standard model and for the first time, we show that a class of Hierarchical Identity-Based Encryption (HIBE) schemes can be transferred to building a CCA-secure CPRE in the standard model. We also list out some concrete HIBE schemes which fall into this class, e.g., Lewko-Waters HIBE. All existing CCA-secure PRE schemes in the standard model are not conditional while all existing CPRE schemes are either not CCA secure or not in the standard model. By instantiating our generic HIBE-based transformation, we show that an efficient and concrete CPRE scheme which is both CCA secure in the standard model and conditional can be built.

Item Type: Article
Divisions : Faculty of Engineering and Physical Sciences > Computing Science
Authors :
Susilo, Willy
Liu, Joseph K
Wong, Duncan S
Date : 2015
DOI : 10.1093/comjnl/bxv050
Copyright Disclaimer : © The British Computer Society 2015. All rights reserved. For Permissions, please email:
Uncontrolled Keywords : conditional proxy re-encryption; hierarchical identity-based encryption; chosen-ciphertext security
Depositing User : Jane Hindle
Date Deposited : 31 Oct 2017 10:27
Last Modified : 16 Jan 2019 19:03

Actions (login required)

View Item View Item


Downloads per month over past year

Information about this web site

© The University of Surrey, Guildford, Surrey, GU2 7XH, United Kingdom.
+44 (0)1483 300800