Paper 2025/1423

Collusion-Safe Proxy Re-Encryption

Haotian Yin, Xi'an Jiaotong-Liverpool University
Jie Zhang, Xi'an Jiaotong-Liverpool University
Wanxin Li, Xi'an Jiaotong-Liverpool University
Yuji Dong, Xi'an Jiaotong-Liverpool University
Eng Gee Lim, Xi'an Jiaotong-Liverpool University
Dominik Wojtczak, University of Liverpool
Abstract

Proxy re-encryption is a cryptographic scheme enabling a delegator (user $i$) to delegate its decryption right to a valid delegatee (user $j$) through a proxy, who cannot extract any information about the message during the procedure. An important security notion is the security against collusion between the proxy and the delegatee. In this case, the adversary has the secret key of the delegatee, $\mathsf{sk}_j$, and the re-encryption key, $\mathsf{rk}_{i\to j}$. The master secret security is first formalised by Ateniese et al. (NDSS'05) to capture the secrecy of $i$'s secret key during collusion. This notion was further formalised by Zhou et al. (ASIACRYPT'23) as the indistinguishability of re-encrypted ciphertext against chosen-message attacks, called collusion safety, which implies the master secret security. In this paper, we find that a PRE scheme is not master secret secure as they claimed, and many other schemes were not master secret secure. Then, we propose a generic construction to achieve collusion safety at the cost of doubling the key size from the IND-CPA secure PRE, enjoying a much better generality and efficiency than the existing technique by secret sharing.

Note: In the earlier pre-proceedings version of this work, the level-2 encryption algorithm $\mathsf{Enc}'(2,\cdot,\cdot)$ directly invoked the underlying $\mathsf{Enc}$. We modified this to use a temporary key pair and re-encryption. This adjustment ensures that the generated ciphertext distribution matches the simulator's distribution in our reduction, thereby closing a simulation gap in the security proof for collusion safety without requiring any additional assumptions (re-encryption simulatability).

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Minor revision. FC 2026
Keywords
Collusion safetyProxy re-encryptionMaster secret secrecy
Contact author(s)
haotian yin23 @ student xjtlu edu cn
History
2026-02-26: last of 2 revisions
2025-08-05: received
See all versions
Short URL
https://ia.cr/2025/1423
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2025/1423,
      author = {Haotian Yin and Jie Zhang and Wanxin Li and Yuji Dong and Eng Gee Lim and Dominik Wojtczak},
      title = {Collusion-Safe Proxy Re-Encryption},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/1423},
      year = {2025},
      url = {https://eprint.iacr.org/2025/1423}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.