Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
Lifeng Guo,Lei Hu +1 more
Reads0
Chats0
TLDR
A direct design of the bidirectional CCA-secure PRE scheme, which makes a direct use of the underlying IBE structure and does not need any auxiliary signature mechanism, which is efficient and suitable for further designing multi-user PRE schemes.Abstract:
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for a user into another ciphertext of the same message intended for another user, and the proxy, however, cannot learn anything about the message encrypted In previous papers, in order to achieve the CCA2-security, a common method for constructing PRE schemes was to apply the paradigm of using strongly-unforgeable one-time signature which transforms a selective-identity, CPA-secure identity-based encryption (IBE) scheme into a CCA-secure cryptosystem In this paper, we propose a direct design of the bidirectional CCA-secure PRE scheme, which makes a direct use of the underlying IBE structure and does not need any auxiliary signature mechanism Our construction is efficient and suitable for further designing multi-user PRE schemes Its security is proved on the base of the decisional bilinear Diffie-Hellman assumption in the standard modelread more
Citations
More filters
Journal ArticleDOI
Provably Secure Timed-Release Proxy Conditional Reencryption
TL;DR: A timed-release proxy conditional reencryption scheme for cloud computing that not only is the privacy of users' files guaranteed but also each user can freely share some desired file with another user under the restriction on the time factor.
Proceedings ArticleDOI
A Multi-use CCA-Secure Proxy Re-encryption Scheme
Yi Cai,Xudong Liu +1 more
TL;DR: A new type attack to multi-use CCA-secure PRE named proxy bypass attack is proposed with a concrete attacks on Wang-Multi-Use-PRE scheme to resistproxy bypass attack by randomize re-encryption algorithm.
Journal ArticleDOI
Cryptanalysis of A Multi-use CCA-secure Proxy Re-encryption Scheme
TL;DR: This paper proposes an improvement for Wang-Multi use PRE to resist Zhang’s attack and finds a new type attack to multi-use CCAsecure PRE named proxy bypass attack, which is effective for other multi- use scheme.
Book ChapterDOI
Secure Non-transferable Proxy Re-encryption for Group Membership and Non-membership
TL;DR: A non-transferable PRE scheme is introduced, which solved the above PKG despotism problem and key-escrow problem and will provide the security for delegator i, delegatee j, and delegatee k.
References
More filters
Book ChapterDOI
Fuzzy identity-based encryption
Amit Sahai,Brent Waters +1 more
TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content
Fuzzy Identity Based Encryption.
Amit Sahai,Brent Waters +1 more
TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Book ChapterDOI
Efficient identity-based encryption without random oracles
TL;DR: This work first presents their IBE construction and reduces the security of the scheme to the decisional Bilinear Diffie-Hellman (BDH) problem, and shows that their techniques can be used to build a new signature scheme that is secure under the computational Diffie -Hellman assumption without random oracles.
Journal ArticleDOI
Improved proxy re-encryption schemes with applications to secure distributed storage
TL;DR: Performance measurements of the experimental file system demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system and present new re-Encryption schemes that realize a stronger notion of security.
Book ChapterDOI
Divertible protocols and atomic proxy cryptography
TL;DR: A definition of protocol divertibility is given that applies to arbitrary 2-party protocols and is compatible with Okamoto and Ohta's definition in the case of interactive zero-knowledge proofs and generalizes to cover several protocols not normally associated with divertibility.