SLIDE 11 Introduction Model of C-PRE Our proposed C-PRE Scheme Conclusion Principles for Designing CCA-Secure C-PRE Our Proposed C-PRE Scheme Security of Our Scheme
Our Scheme: A First Attempt
Setup(1κ): The global parameter is param = ((q, G, GT, e), g, n, H1, · · · , H5). KeyGen(1κ): user i’s secret key ski = xi ∈R Zq, and public key pki = gxi. ReKeyGen(ski, w, pkj): Pick s ∈R Zq. The re-encryption key from user i to j w.r.t condition w is rki w
→j = (rk1, rk2) =
j
−ski , pks
i
Enc2(pk, m, w): Pick R ∈R GT, and compute r = H1(m, R). The second level ciphertext is CT = (C1, C2, C3, C4) =
- gr, R · e(pk, H2(pk, w))r, m ⊕ H3(R), H4(C1, C2, C3)r
. ReEnc(CTi, rki w
→j): Given CTi = (C1, C2, C3, C4) and rki w →j = (rk1, rk2), check
e(C1, H4(C1, C2, C3)) ? = e(g, C4). If no, output ⊥; else output CTj = (C1, C2, C3, C4) = (C1, C2 · e(C1, rk1), C3, rk2) . Enc1(pk, m): Pick R ∈R GT, s ∈R Z∗
q, and compute r = H1(m, R). The first level
ciphertext CT is CT = (C1, C2, C3, C4) =
- gr, R · e(g, pk)−r·s, m ⊕ H3(R), gs
. Algorithms Dec2(CT, sk) and Dec1(CT, sk) can be given accordingly.
Jian Weng, Yanjiang Yang, Qiang Tang, Robert H. Deng, Feng Bao Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext