TY - GEN
T1 - Bidirectional proxy re-encryption schemes without pairing nor random oracle
AU - Wang, Xu An
AU - Wei, Ping
AU - Zhong, Weidong
AU - Yang, Xiaoyuan
PY - 2010
Y1 - 2010
N2 - Blaze et al. in 1998 introduced the concept of proxy re-encryption, which allows a proxy to transform a ciphertext computed under Alice's public key into one that can be opened under Bob's decryption key. In CCS'07, Canetti et al. proposed an IND-PRE-CCA2 bidirectional proxy re-encryption scheme, and later, Libert et al. proposed another IND-PRE-CCA2 secure unidirectional proxy re-encryption. However, both schemes rely on the costly bilinear pairings. In CANS'08, Deng et al. proposed the first IND-PRE-CCA2 secure proxy re-encryption without parings. Later, in PKC'09, Shao et al. proposed another IND-PRE-CCA2 secure proxy re-encryption without parings. But both of these schemes prove their security in the random oracle. In this paper, based on Hanaoka's efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption, we present two new interesting bidirectional proxy re-encryption schemes, which are restricted IND-PRE-CCA2 secure without pairing nor random oracle.
AB - Blaze et al. in 1998 introduced the concept of proxy re-encryption, which allows a proxy to transform a ciphertext computed under Alice's public key into one that can be opened under Bob's decryption key. In CCS'07, Canetti et al. proposed an IND-PRE-CCA2 bidirectional proxy re-encryption scheme, and later, Libert et al. proposed another IND-PRE-CCA2 secure unidirectional proxy re-encryption. However, both schemes rely on the costly bilinear pairings. In CANS'08, Deng et al. proposed the first IND-PRE-CCA2 secure proxy re-encryption without parings. Later, in PKC'09, Shao et al. proposed another IND-PRE-CCA2 secure proxy re-encryption without parings. But both of these schemes prove their security in the random oracle. In this paper, based on Hanaoka's efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption, we present two new interesting bidirectional proxy re-encryption schemes, which are restricted IND-PRE-CCA2 secure without pairing nor random oracle.
UR - https://www.scopus.com/pages/publications/77958603313
U2 - 10.1109/ICCSIT.2010.5564002
DO - 10.1109/ICCSIT.2010.5564002
M3 - 会议稿件
AN - SCOPUS:77958603313
SN - 9781424455386
T3 - Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010
SP - 674
EP - 677
BT - Proceedings - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010
T2 - 2010 3rd IEEE International Conference on Computer Science and Information Technology, ICCSIT 2010
Y2 - 9 July 2010 through 11 July 2010
ER -