scispace - formally typeset
Open AccessBook ChapterDOI

CCA proxy re-encryption without bilinear maps in the standard model

Reads0
Chats0
TLDR
This paper constructs a bidirectional PRE-CCA proxy re-encryption without bilinear maps in the standard model, and defines a new variant of LTDFs, re-applicable LTDF’s, which are specializedLTDFs for PRE, and use them for the scheme.
Abstract
Proxy re-encryption (PRE) is a cryptographic application proposed by Blaze, Bleumer, and Strauss. It is an encryption system with a special property in which the semi-honest third party, the proxy, can re-encrypt ciphertexts for Alice into other ciphertexts for Bob without using Alice’s secret key. We can classify PRE into bidirectional and unidirectional schemes. Canetti and Hohenberger formalized the semantic security under chosen ciphertext attack for PRE, the PRE-CCA security. Several schemes satisfy the PRE-CCA security as a bidirectional or unidirectional scheme. However, some PRE schemes need a bilinear map in the standard model, and the other PRE schemes are PRE-CCA secure in the random oracle model before our work. In this paper, we construct a bidirectional PRE-CCA proxy re-encryption without bilinear maps in the standard model. We study lossy trapdoor functions (LTDFs) based on the decisional Diffie-Hellman (DDH) assumption proposed by Peikert and Waters. We define a new variant of LTDFs, re-applicable LTDFs, which are specialized LTDFs for PRE, and use them for our scheme.

read more

Content maybe subject to copyright    Report

Citations
More filters
Book

IEICE transactions on fundamentals of electronics, communications and computer sciences

TL;DR: Special Section on Networked Control Systems: Theories & Applications is planned to accelerate R&D activities in this area by collecting and publishing the results on up-to-date researches and experimental studies related to NCS.
Journal ArticleDOI

Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email

TL;DR: This paper proposes a versatile primitive referred to as conditional identity-based broadcast PRE (CIBPRE) and formalizes its semantic security and shows an application of the CIBPRE to secure cloud email system advantageous over existing secure email systems based on Pretty Good Privacy protocol or identity- based encryption.
Book

Public key cryptography -- PKC 2008 : 11th International Workshop on Practice and Theory in Public Key Cryptography, Barcelona, Spain, March 9-12, 2008 : proceedings

TL;DR: In this paper, the authors discuss the theory of public key encryption and the security of digital signature schemes in the context of cryptosystems over prime fields, and present a digital signature scheme based on CVP.
Journal ArticleDOI

Identity-based data storage in cloud computing

TL;DR: This paper proposes an identity-based data storage scheme where both queries from the intra-domain and inter-domain are considered and collusion attacks can be resisted and the access permission can be determined by the owner independently.
Book ChapterDOI

Generic construction of chosen ciphertext secure proxy re-encryption

TL;DR: This paper presents the first generic construction of a chosen-ciphertext (CCA) secure uni-directional proxy re-encryption (PRE) scheme and establishes a totally novel methodology for designing PRE based on a specific class of threshold encryption.
References
More filters
Journal ArticleDOI

Improved proxy re-encryption schemes with applications to secure distributed storage

TL;DR: Performance measurements of the experimental file system demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system and present new re-Encryption schemes that realize a stronger notion of security.
Book ChapterDOI

Divertible protocols and atomic proxy cryptography

TL;DR: A definition of protocol divertibility is given that applies to arbitrary 2-party protocols and is compatible with Okamoto and Ohta's definition in the case of interactive zero-knowledge proofs and generalizes to cover several protocols not normally associated with divertibility.
Proceedings ArticleDOI

Public-key cryptosystems provably secure against chosen ciphertext attacks

Moni Naor, +1 more
TL;DR: This work shows how to construct a public-key cryptosystem (as originally defined by DiNe and Hellman) secure against chosen ciphertezt attacks, given aPublic-Key cryptosystern secure against passive eavesdropping and a noninteractive zero-knowledge proof system in the shared string model.
Related Papers (5)