Abstract

Proxy re-encryption (PRE) has recently become a hot topic in cryptography research field. PRE can be classified as single-hop PRE and multi-use PRE according to the times the cipher text can be transformed. Finding a unidirectional, multi-use, and chosen cipher text attack (CCA) secure PRE is presented as an open problem by Green et al. Wang claimed to resolve this problem by proposing the first multi-use CCA-secure unidirectional PRE scheme. But we found that different with single-hop PRE, multi-use PRE without randomize encrypt key in its encryption algorithm could be vulnerable to attack. A new type attack to multi-use CCA-secure PRE named proxy bypass attack is proposed with a concrete attacks on Wang-Multi-Use-IB-PRE scheme. This attack is also effective for other multi-use scheme. At last we propose an improvement for Multi-Use-IB-PRE to resist proxy bypass attack by randomize re-encryption algorithm.

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call