JISE


  [ 1 ] [ 2 ] [ 3 ] [ 4 ] [ 5 ] [ 6 ] [ 7 ] [ 8 ] [ 9 ] [ 10 ] [ 11 ] [ 12 ] [ 13 ] [ 14 ] [ 15 ]


Journal of Information Science and Engineering, Vol. 33 No. 4, pp. 993-1006


Efficiently Obfuscating Anonymous Re-encryption Functionality with Average-Case Virtual Black-Box Security


MINGWU ZHANG1,2, YUDI ZHANG1, HUA SHEN1, CHUNMING TANG3 AND LEIN HARN4
1School of Computers
Hubei University of Technology
Wuhan, 430068 P.R. China

2School of Computer and Software
Nanjing University of Information Science and Technology
Nanjing, 210044 P.R. China

3Key Laboratory of Mathematics and Interdisciplinary Sciences of
Guangdong Higher Education Institutes
Guangzhou University
Guangzhou, 510006 P.R. China

4University of Missouri
Kansas City, MO 65211 USA
E-mail: csmwzhang@gmail.com


Outsource computing might reveal some private information in open cloud systems and the concern of users' privacy will be a crucial issue. Program obfuscation is an important cryptographic primitive that perfectly hides the secrets inside a program while preserving its functionality. In this paper, we give a two-form re-encryption scheme that achieves the security against adaptively chosen-ciphertext attacks, which allows any third party (e.g., cloud server) to re-encrypt the ciphertext that delegates the decryption right from one to another. However, as the third party knows the sensitive secret (i.e., re-key), and thus we should guarantee the trustworthy of this cloud server. Based the re-encryption algorithm, we propose an efficient obfuscator that implements the re-encryption functionality in such a way that not only the private information is protected but also cloud users’ privacy is preserved, and thus the re-encryption procedure can be run on untrusted outsourcing server. We prove the virtual black-box security of the obfuscation. The proposed obfuscator can be run on untrusted server to help the perform of the functionality of re-encryption without any sensitive secret revealing.


Keywords: cyptographic obfuscation, unidirectional, re-encryption, virtual-black box, bilinear map

  Retrieve PDF document (JISE_201704_09.pdf)