Title :
Comments on “Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption”
Author :
Jae Woo Seo ; Dae Hyun Yum ; Pil Joong Lee
Author_Institution :
Dept. of Electr. Eng., Pohang Univ. of Sci. & Technol., Pohang, South Korea
Abstract :
Libert and Vergnaud proposed a unidirectional proxy re-encryption scheme with temporary delegation (IEEE Trans. Inf. Theory, vol. 57, no. 3, pp. 1786-1802, Mar. 2011). They claimed that the scheme is chosen ciphertext secure in the chosen key model. However, their proof has a minor error in the simulation of the re-encryption oracle. The adversary is able to distinguish between the simulated environment and the real attack environment by using responses from the re-encryption oracle. Fortunately, we can amend the proof without any modification of the original scheme.
Keywords :
cryptography; real attack environment; reencryption oracle; simulated environment; unidirectional chosen-ciphertext secure proxy reencryption; Computational modeling; Educational institutions; Electrical engineering; Encryption; Indexes; Materials; Chosen ciphertext security; chosen key model; proxy re-encryption; security proof;
Journal_Title :
Information Theory, IEEE Transactions on
DOI :
10.1109/TIT.2012.2236606