scispace - formally typeset
Open AccessJournal ArticleDOI

Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security

Reads0
Chats0
TLDR
A direct design of the bidirectional CCA-secure PRE scheme, which makes a direct use of the underlying IBE structure and does not need any auxiliary signature mechanism, which is efficient and suitable for further designing multi-user PRE schemes.
Abstract
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for a user into another ciphertext of the same message intended for another user, and the proxy, however, cannot learn anything about the message encrypted In previous papers, in order to achieve the CCA2-security, a common method for constructing PRE schemes was to apply the paradigm of using strongly-unforgeable one-time signature which transforms a selective-identity, CPA-secure identity-based encryption (IBE) scheme into a CCA-secure cryptosystem In this paper, we propose a direct design of the bidirectional CCA-secure PRE scheme, which makes a direct use of the underlying IBE structure and does not need any auxiliary signature mechanism Our construction is efficient and suitable for further designing multi-user PRE schemes Its security is proved on the base of the decisional bilinear Diffie-Hellman assumption in the standard model

read more

Citations
More filters
Journal ArticleDOI

Provably Secure Timed-Release Proxy Conditional Reencryption

TL;DR: A timed-release proxy conditional reencryption scheme for cloud computing that not only is the privacy of users' files guaranteed but also each user can freely share some desired file with another user under the restriction on the time factor.
Proceedings ArticleDOI

A Multi-use CCA-Secure Proxy Re-encryption Scheme

TL;DR: A new type attack to multi-use CCA-secure PRE named proxy bypass attack is proposed with a concrete attacks on Wang-Multi-Use-PRE scheme to resistproxy bypass attack by randomize re-encryption algorithm.
Journal ArticleDOI

Cryptanalysis of A Multi-use CCA-secure Proxy Re-encryption Scheme

TL;DR: This paper proposes an improvement for Wang-Multi use PRE to resist Zhang’s attack and finds a new type attack to multi-use CCAsecure PRE named proxy bypass attack, which is effective for other multi- use scheme.
Book ChapterDOI

Secure Non-transferable Proxy Re-encryption for Group Membership and Non-membership

TL;DR: A non-transferable PRE scheme is introduced, which solved the above PKG despotism problem and key-escrow problem and will provide the security for delegator i, delegatee j, and delegatee k.
References
More filters
Book ChapterDOI

Fuzzy identity-based encryption

TL;DR: In this article, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Posted Content

Fuzzy Identity Based Encryption.

TL;DR: In this paper, a new type of identity-based encryption called Fuzzy Identity-Based Encryption (IBE) was introduced, where an identity is viewed as set of descriptive attributes, and a private key for an identity can decrypt a ciphertext encrypted with an identity if and only if the identities are close to each other as measured by the set overlap distance metric.
Book ChapterDOI

Efficient identity-based encryption without random oracles

TL;DR: This work first presents their IBE construction and reduces the security of the scheme to the decisional Bilinear Diffie-Hellman (BDH) problem, and shows that their techniques can be used to build a new signature scheme that is secure under the computational Diffie -Hellman assumption without random oracles.
Journal ArticleDOI

Improved proxy re-encryption schemes with applications to secure distributed storage

TL;DR: Performance measurements of the experimental file system demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system and present new re-Encryption schemes that realize a stronger notion of security.
Book ChapterDOI

Divertible protocols and atomic proxy cryptography

TL;DR: A definition of protocol divertibility is given that applies to arbitrary 2-party protocols and is compatible with Okamoto and Ohta's definition in the case of interactive zero-knowledge proofs and generalizes to cover several protocols not normally associated with divertibility.
Related Papers (5)