Volume 8 Number 3 (Mar. 2013)
Home > Archive > 2013 > Volume 8 Number 3 (Mar. 2013) >
JSW 2013 Vol.8(3): 617-626 ISSN: 1796-217X
doi: 10.4304/jsw.8.3.617-626

DDos Attack against Proxy in PRE and PRS

Jindan Zhang1, Xu An Wang2, Xiaoyuan Yang2
1Department of Electronic Information Xianyang Vocational Technical College, 712000, P. R. China
2Key Laboratory of Information and Network Security Engineering University of Chinese Armed Police Force, 710086, P. R. China

Abstract—In 1998, Blaze, Bleumer, and Strauss proposed new kind of cryptographic primitives called proxy reencryption (PRE) and proxy re-signature (PRS) [2]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice’s public key into one that can be opened under Bob’s decryption key. In proxy re-signature, a proxy can transform a signature computed under Alice’s secret key into one that can be verified by Bob’s public key. In 2005, Ateniese et al proposed a few new re-encryption schemes and discussed its several potential applications especially in the secure distributed storage [6]. In 2006, they proposed another few proxy re-signature schemes and also discussed its several potential applications [7]. They predicated that proxy re-encryption and proxy re-signature will play an important role in our life. Since then, researchers are sparked to give new lights to this area. Many excellent schemes have been proposed. In this paper, we introduce a new attack- DDos attack against proxy in the proxy recryptography. Although this attack can also be implemented against other cryptographic primitives, the danger caused by it in proxy re-cryptography seems more serious. We revisit the current literature, paying attention on their resisting DDos attack ability. We suggest a solution to decline the impact of DDos attacking. Also we give a new efficient reencryption scheme which can achieve CCA2 secure based on Cramer-Shoup encryption scheme and prove its security. We point out this is the most efficient proxy re-encryption schemes for the proxy which can achieve CCA2 secure in the literature. At last we give our conclusions with hoping researchers give more attention on this attack.

[PDF]

Cite: Jindan Zhang, Xu An Wang, Xiaoyuan Yang, "DDos Attack against Proxy in PRE and PRS," Journal of Software vol. 8, no. 3, pp. 617-626, 2013.

General Information

ISSN: 1796-217X (Online)
Frequency: Monthly (2006-2019); Bimonthly (Since 2020)
Editor-in-Chief: Prof. Antanas Verikas
Executive Editor: Ms. Yoyo Y. Zhou
Abstracting/ Indexing: DBLP, EBSCO, ProQuest, INSPEC, ULRICH's Periodicals Directory, WorldCat, etc
E-mail: jsw@iap.org
  • Dec 06, 2019 News!

    Vol 14, No 1- Vol 14, No 4 has been indexed by EI (Inspec)   [Click]

  • Nov 18, 2019 News!

    Papers published in JSW Vol 14, No 1- Vol 14 No 10 have been indexed by DBLP     [Click]

  • Jan 31, 2020 News!

    Vol 15, No 1 has been published with online version     [Click]

  • Aug 01, 2018 News!

    [CFP] 2020 the annual meeting of JSW Editorial Board, ICCSM 2020, will be held in Rome, Italy, July 17-19, 2020   [Click]

  • Jun 25, 2019 News!

    Vol.13, No.9 has been indexed by EI (Inspec).   [Click]