跳到主要导航 跳到搜索 跳到主要内容

Bidirectional proxy re-encryption schemes without pairing nor random oracle

科研成果: 书/报告/会议事项章节会议稿件同行评审

摘要

Blaze et al. in 1998 introduced the concept of proxy re-encryption, which allows a proxy to transform a ciphertext computed under Alice's public key into one that can be opened under Bob's decryption key. In CCS'07, Canetti et al. proposed an IND-PRE-CCA2 bidirectional proxy re-encryption scheme, and later, Libert et al. proposed another IND-PRE-CCA2 secure unidirectional proxy re-encryption. However, both schemes rely on the costly bilinear pairings. In CANS'08, Deng et al. proposed the first IND-PRE-CCA2 secure proxy re-encryption without parings. Later, in PKC'09, Shao et al. proposed another IND-PRE-CCA2 secure proxy re-encryption without parings. But both of these schemes prove their security in the random oracle. In this paper, based on Hanaoka's efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption, we present two new interesting bidirectional proxy re-encryption schemes, which are restricted IND-PRE-CCA2 secure without pairing nor random oracle.

源语言英语
主期刊名Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010
674-677
页数4
DOI
出版状态已出版 - 2010
已对外发布
活动2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010 - Chengdu, 中国
期限: 9 7月 201011 7月 2010

出版系列

姓名Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010
5

会议

会议2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010
国家/地区中国
Chengdu
时期9/07/1011/07/10

指纹

探究 'Bidirectional proxy re-encryption schemes without pairing nor random oracle' 的科研主题。它们共同构成独一无二的指纹。

引用此