Tightly, Adaptively Secure Proxy Re-encryption in Multi-challenge Setting

  • Yunhao Ling
  • , Jie Chen*
  • , Zijian Bao
  • , Man Ho Au
  • , Luping Wang
  • , Haifeng Qian
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

Proxy Re-Encryption (PRE) enables a proxy to transform ciphertexts encrypted under Alice’s key into ciphertexts under Bob’s key, allowing Bob to decrypt them. As a powerful cryptographic primitive, PRE has been extensively studied over the past two decades. However, an open problem remains unresolved, namely constructing an adaptively secure PRE scheme where the security reduction is tight. In this paper, we present the first PRE scheme that achieves adaptive security in multi-challenge setting, with a tight security reduction, i.e., constant security loss O(1). In our setting, the adversary can obtain multiple challenge ciphertexts for multiple target users, capturing a more realistic and powerful adversary. In contrast, previous works established adaptive security only under the single-challenge setting, where the adversary is restricted to a single challenge query, and such schemes incur security losses of nO(logn) for trees and chains, and nO(n) for general graphs, where n is the number of users. Our construction is based on composite-order bilinear groups, and we prove the security in the standard model. The results indicate that our security guarantees do not degrade with respect to either the number of users or the number of ciphertexts, thanks to the tight reduction.

Original languageEnglish
Title of host publicationAdvances in Cryptology - ASIACRYPT 2025 - 31st International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
EditorsGoichiro Hanaoka, Bo-Yin Yang
PublisherSpringer Science and Business Media Deutschland GmbH
Pages174-204
Number of pages31
ISBN (Print)9789819551187
DOIs
StatePublished - 2026
Event31st Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025 - Melbourne, Australia
Duration: 8 Dec 202512 Dec 2025

Publication series

NameLecture Notes in Computer Science
Volume16250 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference31st Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2025
Country/TerritoryAustralia
CityMelbourne
Period8/12/2512/12/25

Keywords

  • Adaptive security
  • Multi-challenge setting
  • Multi-user security
  • Proxy re-encryption
  • Tight security

Fingerprint

Dive into the research topics of 'Tightly, Adaptively Secure Proxy Re-encryption in Multi-challenge Setting'. Together they form a unique fingerprint.

Cite this