{"title":"Full-grained proxy re-encryption for all circuits","authors":"Yuxin Zhang , Shengli Liu , Yunxiao Zhou , Haibin Zhang","doi":"10.1016/j.tcs.2025.115507","DOIUrl":null,"url":null,"abstract":"<div><div>In this paper, we proposed a new concept called <em>Full-Grained PRE</em> (FG-PRE) to which a function set <span><math><mi>F</mi></math></span> is attached. With FG-PRE, a delegator authorizes the proxy a full-grained re-encryption capability for <span><math><mi>F</mi></math></span> with a <em>single</em> re-encryption key <span><math><mi>r</mi><msub><mrow><mi>k</mi></mrow><mrow><mi>i</mi><mo>→</mo><mi>j</mi></mrow></msub></math></span>. Then, the proxy can use this <em>single</em> re-encryption key to transform <span><math><mi>c</mi><msup><mrow><mi>t</mi></mrow><mrow><mo>(</mo><mi>i</mi><mo>)</mo></mrow></msup></math></span> encrypting message <em>m</em> for delegator <em>i</em> into an re-encrypted ciphertext <span><math><mi>c</mi><msup><mrow><mi>t</mi></mrow><mrow><mo>(</mo><mi>j</mi><mo>)</mo></mrow></msup></math></span> encrypting <span><math><mi>f</mi><mo>(</mo><mi>m</mi><mo>)</mo></math></span> with <em>arbitrary</em> <span><math><mi>f</mi><mo>∈</mo><mi>F</mi></math></span> for delegatee <em>j</em>. Thus, the proxy has a full-grained (w.r.t. <span><math><mi>F</mi></math></span>) control of the information that can be transmitted to the delegatee <em>j</em>. This is in sharp contrast to fine-grained PRE (Zhou et al. ASIACRYPT 2023), which has to generate <em>different</em> re-encryption keys to support different functions. In their fine-grained PRE, the number of re-encryption keys generated by delegator and stored by the proxy for <span><math><mi>F</mi></math></span> is linear to the size <span><math><mo>|</mo><mi>F</mi><mo>|</mo></math></span>. With our full-grained PRE, a single re-encryption key suffices.</div><div>We formalize the syntax of FG-PRE and define <span><math><mi>HRA</mi></math></span> security (security under honest re-encryption attack) and function private <span><math><mi>HRA</mi></math></span> security (<span><math><mi>FP</mi><mtext>-</mtext><mi>HRA</mi></math></span>) for FG-PRE. Compared to the <span><math><mi>CPA</mi></math></span> security (Zhou et al. ASIACRYPT 2023) and the <span><math><mi>HRA</mi></math></span> security (Zhou et al. PKC 2024) defined for the fine-grained PRE, our <span><math><mi>HRA</mi></math></span> security not only allows adversary to obtain re-encryption keys from honest users to corrupted users, but also has an enhancement: we even allow the adversary to query full-grained re-encryptions with <em>f</em> for the challenge ciphertext under the condition <span><math><mi>f</mi><mo>(</mo><msub><mrow><mi>m</mi></mrow><mrow><mn>0</mn></mrow></msub><mo>)</mo><mo>=</mo><mi>f</mi><mo>(</mo><msub><mrow><mi>m</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>)</mo></math></span>. We construct a FG-PRE scheme <span><math><msup><mrow><mtext>FG-PRE</mtext></mrow><mrow><mtext>lin</mtext></mrow></msup></math></span> for bounded linear function <span><math><msub><mrow><mi>F</mi></mrow><mrow><mtext>lin</mtext></mrow></msub></math></span>, enjoying single-hop, unidirectional and non-interactive properties. Our scheme achieves the <span><math><mi>HRA</mi></math></span> security and <span><math><mi>FP</mi><mtext>-</mtext><mi>HRA</mi></math></span> security and can be tightly reduced to the eDBDH assumption.</div><div>Furthermore, we extend our <span><math><msup><mrow><mtext>FG-PRE</mtext></mrow><mrow><mtext>lin</mtext></mrow></msup></math></span> scheme to a new FG-PRE scheme <span><math><msup><mrow><msup><mrow><mtext>FG-PRE</mtext></mrow><mrow><mo>′</mo></mrow></msup></mrow><mrow><mtext>circuit</mtext></mrow></msup></math></span>, supporting all circuits of bounded-size with the help of randomized encoding technique. We prove that our <span><math><msup><mrow><msup><mrow><mtext>FG-PRE</mtext></mrow><mrow><mo>′</mo></mrow></msup></mrow><mrow><mtext>circuit</mtext></mrow></msup></math></span> scheme also has <span><math><mi>HRA</mi></math></span> security and <span><math><mi>FP</mi><mtext>-</mtext><mi>HRA</mi></math></span> security. With our <span><math><msup><mrow><msup><mrow><mtext>FG-PRE</mtext></mrow><mrow><mo>′</mo></mrow></msup></mrow><mrow><mtext>circuit</mtext></mrow></msup></math></span> scheme, the proxy is able to use a single re-encryption key to convert ciphertext under any circuit of polynomial-bounded size.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1056 ","pages":"Article 115507"},"PeriodicalIF":1.0000,"publicationDate":"2025-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Theoretical Computer Science","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0304397525004451","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, THEORY & METHODS","Score":null,"Total":0}
引用次数: 0
Abstract
In this paper, we proposed a new concept called Full-Grained PRE (FG-PRE) to which a function set is attached. With FG-PRE, a delegator authorizes the proxy a full-grained re-encryption capability for with a single re-encryption key . Then, the proxy can use this single re-encryption key to transform encrypting message m for delegator i into an re-encrypted ciphertext encrypting with arbitrary for delegatee j. Thus, the proxy has a full-grained (w.r.t. ) control of the information that can be transmitted to the delegatee j. This is in sharp contrast to fine-grained PRE (Zhou et al. ASIACRYPT 2023), which has to generate different re-encryption keys to support different functions. In their fine-grained PRE, the number of re-encryption keys generated by delegator and stored by the proxy for is linear to the size . With our full-grained PRE, a single re-encryption key suffices.
We formalize the syntax of FG-PRE and define security (security under honest re-encryption attack) and function private security () for FG-PRE. Compared to the security (Zhou et al. ASIACRYPT 2023) and the security (Zhou et al. PKC 2024) defined for the fine-grained PRE, our security not only allows adversary to obtain re-encryption keys from honest users to corrupted users, but also has an enhancement: we even allow the adversary to query full-grained re-encryptions with f for the challenge ciphertext under the condition . We construct a FG-PRE scheme for bounded linear function , enjoying single-hop, unidirectional and non-interactive properties. Our scheme achieves the security and security and can be tightly reduced to the eDBDH assumption.
Furthermore, we extend our scheme to a new FG-PRE scheme , supporting all circuits of bounded-size with the help of randomized encoding technique. We prove that our scheme also has security and security. With our scheme, the proxy is able to use a single re-encryption key to convert ciphertext under any circuit of polynomial-bounded size.
期刊介绍:
Theoretical Computer Science is mathematical and abstract in spirit, but it derives its motivation from practical and everyday computation. Its aim is to understand the nature of computation and, as a consequence of this understanding, provide more efficient methodologies. All papers introducing or studying mathematical, logic and formal concepts and methods are welcome, provided that their motivation is clearly drawn from the field of computing.