5 CONCLUSIONS
In this paper, we have proposed a new primitive
called conditional proxy re-signature. We have de-
fined a suitable security model for conditional proxy
re-signatures. We have presented a concrete condi-
tional proxy re-signature scheme which is unidirec-
tional and single-use, and proved the security in the
random oracle model. The security of the proposed
scheme is related to the hardness of the CDH prob-
lem.
We let the design of a multi-use CPRS scheme,
where the signature can be translated more than one
time with a nominal increase in complexity and sig-
nature size for each translation as an interesting open
problem. Providing CPRS schemes in the identity
based setting and certificateless settings would also
be challenging and would have practical relevance in
cloud based systems. A standard model security proof
would further solidify the practical applicability of
such a scheme.
REFERENCES
Ateniese, G., Fu, K., Green, M., and Hohenberger, S.
(2006). Improved proxy re-encryption schemes with
applications to secure distributed storage. ACM Trans.
Inf. Syst. Secur., 9(1):1–30.
Ateniese, G. and Hohenberger, S. (2005). Proxy re-
signatures: new definitions, algorithms, and applica-
tions. In ACM Conference on Computer and Commu-
nications Security, pages 310–319.
Blaze, M., Bleumer, G., and Strauss, M. (1998). Divertible
protocols and atomic proxy cryptography. In EURO-
CRYPT, pages 127–144.
Boneh, D., Lynn, B., and Shacham, H. (2001). Short sig-
natures from the weil pairing. In ASIACRYPT, pages
514–532.
Chow, S. S. M. and Phan, R. C.-W. (2008). Proxy re-
signatures in the standard model. In ISC, pages 260–
276.
Chu, C.-K., Weng, J., Chow, S. S. M., Zhou, J., and
Deng, R. H. (2009). Conditional proxy broadcast re-
encryption. In ACISP, pages 327–342.
Fang, L., Susilo, W., Ge, C., and Wang, J. (2011). In-
teractive conditional proxy re-encryption with fine
grain policy. Journal of Systems and Software,
84(12):2293–2302.
Fang, L., Susilo, W., Ge, C., and Wang, J. (2012). Hier-
archical conditional proxy re-encryption. Computer
Standards and Interfaces, vol - 34(no - 4):380 – 389.
Fang, L., Susilo, W., and Wang, J. (2009). Anonymous con-
ditional proxy re-encryption without random oracle.
In ProvSec, pages 47–60.
Fuchsbauer, G. and Pointcheval, D. (2008). Anonymous
proxy signatures. In SCN, pages 201–217.
Ivan, A.-A. and Dodis, Y. (2003). Proxy cryptography re-
visited. In NDSS.
Jos Mara de Fuentes, Ana Isabel Gonzlez-Tablas, A. R.
(2011). Overview of security issues in vehicular ad-
hoc networks. In Handbook of Research on Mobility
and Computing, pages 894–911. Hershey: IGI Global.
Libert, B. and Vergnaud, D. (2008). Multi-use unidirec-
tional proxy re-signatures. In ACM CCS, pages 511–
520.
Mambo, M., Usuda, K., and Okamoto, E. (1996). Proxy sig-
natures for delegating signing operation. In Proceed-
ings of the 3rd ACM, CCS ’96, pages 48–57. ACM.
Maxim Raya, J. H. (2005). The security of vehicular ad hoc
networks. In Proceedings of the 3rd ACM Workshop
on Security of ad hoc and Sensor Networks, SASN -
2005, pages 11–21. ACM.
S. Sree Vivek, S. Sharmila Deva Selvi, V. R. and Ran-
gan, C. P. (2011). Conditional proxy re-encryption
– a more efficient construction. In CNSA, CCIS 196,
pages 502–512.
Shao, J., Cao, Z., Wang, L., and Liang, X. (2007). Proxy
re-signature schemes without random oracles. In IN-
DOCRYPT, pages 197–209.
Shao, J., Feng, M., Zhu, B., Cao, Z., and Liu, P. (2010). The
security model of unidirectional proxy re-signature
with private re-signature key. In ACISP, pages 216–
232.
Shao, J., Wei, G., Ling, Y., and Xie, M. (2011). Identity-
based conditional proxy re-encryption. In IEEE Con-
ference on Communications - ICC, pages 1–5.
Wang, X. a. and Yang, X. (2009). On ddos attack against
proxy in proxy re-encryption and proxy re-signature.
In Proceedings of the 2009 Ninth IEEE International
Conference on Computer and Information Technology
- Volume 02, CIT ’09, pages 213–218. IEEE Computer
Society.
Watanabe, Y. and Numao, M. (2002). Conditional cryp-
tographic delegation for p2p data sharing. In Pro-
ceedings of the 5th International Conference on Infor-
mation Security, ISC ’02, pages 309–321. Springer-
Verlag.
Weng, J., Deng, R. H., Ding, X., Chu, C.-K., and Lai,
J. (2009a). Conditional proxy re-encryption secure
against chosen-ciphertext attack. In ASIACCS, pages
322–332.
Weng, J., Yang, Y., Tang, Q., Deng, R. H., and Bao, F.
(2009b). Efficient conditional proxy re-encryption
with chosen-ciphertext security. In ISC, pages 151–
166.
Zhang, X. and Chen, M.-R. (2009). On the security of a
conditional proxy re-encryption. IEICE Transactions,
92-A(10):2644–2647.
ControlledProxyRe-signing-ConditionalProxyRe-Signatures
193