157 Hits in 5.6 sec

CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model [chapter]

Toshihide Matsuda, Ryo Nishimaki, Keisuke Tanaka
2010 Lecture Notes in Computer Science  
In this paper, we construct a bidirectional PRE-CCA proxy re-encryption without bilinear maps in the standard model.  ...  However, some PRE schemes need a bilinear map in the standard model, and the other PRE schemes are PRE-CCA secure in the random oracle model before our work.  ...  Our Contribution We construct a bidirectional and multi-hop PRE-CCA scheme without bilinear maps in the standard model. All previous PRE-CCA secure schemes in the standard model use bilinear maps.  ... 
doi:10.1007/978-3-642-13013-7_16 fatcat:d5o5yuttrvdf7mcfwvzc5h4mbi

Research on Non-interactive Construction based on Fuzzy Conditional Proxy Re-encryption

Chunpeng Ge, Jiandong Wang, Liming Fang
2015 International Journal of Security and Its Applications  
In a conditional proxy re-encryption (C-PRE) scheme, a semi-trusted proxy can transform Alice's ciphertext into Bob's ciphertext without learning the underlying plaintext, if the ciphertext satisfies a  ...  The queries in IND-level1-CCA game is almost the same as IND-level2-CCA game unless in the following ways: (1) For single-use schemes, the adversary is provided with access to all re-encryption keys, thus  ...  Suppose there exists a polynomial-time adversary that can attack our scheme in the standard model.  ... 
doi:10.14257/ijsia.2015.9.12.36 fatcat:wkhgq7zr4jd7ta2zoeeo5w3wue

On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010 [chapter]

Jian Weng, Yunlei Zhao, Goichiro Hanaoka
2011 Lecture Notes in Computer Science  
In ACM CCS 2007, Canetti and Hohenberger left an interesting open problem of how to construct a chosen-ciphertext secure proxy re-encryption (PRE) scheme without bilinear maps.  ...  The purpose of this paper is to clarify the fact that, it is still an open problem to come up with a chosen-ciphertext secure PRE scheme without bilinear maps in the standard model.  ...  Acknowledgements The first author is supported by the National Science  ... 
doi:10.1007/978-3-642-19379-8_18 fatcat:hpndpwq63fcmjbzmyab5tbuzna

A Chosen-Ciphertext Secure Fuzzy Identity-Based Proxy Re-Encryption Scheme

Chunpeng Ge, Jiandong Wang, Liming Fang
2016 International Journal of Security and Its Applications  
Finally, we present a construction of FIB-PRE and prove its CCA security under the decisional bilinear Diffie-Hellman (DBDH) assumption in the random model. conditional proxy re-encryption scheme, whereby  ...  Green and Ateniese introduced the notion of identity-based proxy re-encryption (IB-PRE), whereby the proxy can covert a ciphertext encrypted under the delegator's identity to an encryption under the delegatee's  ...  Introduction Proxy re-encryption (PRE), introduced by Blaze, Bleumer and Strauss [1] , enables a semi-trusted proxy to transform Alice's ciphertext into Bob's ciphertext of the same message without revealing  ... 
doi:10.14257/ijsia.2016.10.5.33 fatcat:5otdjhi56faihis4efdzm2y35i

Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security

Lifeng Guo, Lei Hu
2012 Computers and Mathematics with Applications  
Its security is proved on the base of the decisional bilinear Diffie-Hellman assumption in the standard model.  ...  Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for a user into another ciphertext of the same message intended for another user, and the proxy, however  ...  Acknowledgments The authors are very grateful to the anonymous reviewers and the editor. Their many helpful and constructive comments and suggestions help us to improve this work significantly.  ... 
doi:10.1016/j.camwa.2011.11.002 fatcat:e443hh4hjbd57jwn4sykiuc54a

Collusion-Resistant Identity-Based Proxy Re-Encryption Without Random Oracles

JunJie Qiu, JungBok Jo, HoonJae Lee
2015 International Journal of Security and Its Applications  
Our scheme is secure against Chosen-Ciphertext Attack (CCA) and collusion attack in the standard model. Organizations.  ...  In identity-based proxy re-encryption, the collusion of the proxy and a delegatee may result in the decryption of ciphertext for delegator.  ...  And it also supported by the BB21 project of Busan Metropolitan City.  ... 
doi:10.14257/ijsia.2015.9.9.29 fatcat:s5k5xalznzatdlcons5t6uwlce

Chosen-ciphertext secure proxy re-encryption

Ran Canetti, Susan Hohenberger
2007 Proceedings of the 14th ACM conference on Computer and communications security - CCS '07  
Our construction is efficient and based only on the Decisional Bilinear Diffie-Hellman assumption in the standard model.  ...  In a proxy re-encryption (PRE) scheme, a proxy is given special information that allows it to translate a ciphertext under one key into a ciphertext of the same message under a different key.  ...  Their CCA IBE scheme is unidirectional and single-hop in the random oracle model, whereas ours is bidirectional and multihop in the standard model.  ... 
doi:10.1145/1315245.1315269 dblp:conf/ccs/CanettiH07 fatcat:k5pojvupfrbmpof423mbyhbg7u

A Secure Multimedia Data Sharing Scheme for Wireless Network

Liming Fang, Liang Liu, Jinyue Xia, Maosheng Sun
2018 Security and Communication Networks  
Third, we prove that our FC-PBRE scheme is CCA-secure in the random oracle model based on the Decisional nBDHE assumption.  ...  In a FC-PBRE scheme, the proxy (the gateway or cloud server) uses a broadcast re-encryption key to re-encrypt the encrypted wireless multimedia data which can be decrypted by a set of delegatees if and  ...  Also, there is no conflicts of interest in the manuscript. Acknowledgments  ... 
doi:10.1155/2018/5037892 fatcat:77zpj4dkrrbetab5ytj2vsrc7y

Group-Based Proxy Re-encryption Scheme [chapter]

Chunbo Ma, Jun Ao
2009 Lecture Notes in Computer Science  
Recently, proxy re-encryption scheme received much attention. In this paper, we propose a proxy re-encryption used for divert ciphertext from one group to another.  ...  We discuss the security of the proposed scheme and show that our scheme withstands chosen ciphertext attack in standard model.  ...  The proposed group-based proxy re-encryption scheme is presented in section 4. In section 5, we discuss the security of the proposed scheme in standard model.  ... 
doi:10.1007/978-3-642-04070-2_108 fatcat:hbzqrnz4xvdmtk4x3gusp7ynpa

Improved anonymous proxy re-encryption with CCA security

Qingji Zheng, Wei Zhu, Jiafeng Zhu, Xinwen Zhang
2014 Proceedings of the 9th ACM symposium on Information, computer and communications security - ASIA CCS '14  
assumption in the random oracle model.  ...  In addition, we propose a new and efficient proxy re-encryption scheme.  ...  Our evaluation shows that the performance is acceptable for many web-based applications. Our future work includes designing anonymous and CCA secure PRE in the standard model.  ... 
doi:10.1145/2590296.2590322 dblp:conf/ccs/ZhengZZZ14 fatcat:mf4tupv4w5bxbhn5zakv6xtp7u

Conditional proxy re-encryption secure against chosen-ciphertext attack

Jian Weng, Robert H. Deng, Xuhua Ding, Cheng-Kang Chu, Junzuo Lai
2009 Proceedings of the 4th International Symposium on Information, Computer, and Communications Security - ASIACCS '09  
In a proxy re-encryption (PRE) scheme [4], a proxy, authorized by Alice, transforms messages encrypted under Alice's public key into encryptions under Bob's public key without knowing the messages.  ...  We formalize its security model and propose an efficient C-PRE scheme, whose chosen-ciphertext security is proven under the 3-quotient bilinear Diffie-Hellman assumption.  ...  Acknowledgment This research is supported by the Office of Research, Singapore Management University.  ... 
doi:10.1145/1533057.1533100 dblp:conf/ccs/WengDDCL09 fatcat:pqpuyxinwzarvcon27y5fhkv7q

Secure proxy re-encryption from CBE to IBE

Yan Chen, Futai Zhang
2008 Wuhan University Journal of Natural Sciences  
In this paper, an efficient hybrid proxy re-encryption scheme that allows the transformation of the ciphertexts in a traditional public key cryptosystem into the ciphertexts in an identity-based system  ...  The scheme has chosen ciphertext security in the random oracle model assuming the hardness of the Decisional Bilinear Diffie-Hellman problem.  ...  Matsuo proposed the first construction of CPA secure proxy re-encryption scheme in the standard model for such a system [11] .  ... 
doi:10.1007/s11859-008-0604-4 fatcat:3dhszeqswfe5bmb5jxdpkwbe2q

Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts

Kaitai Liang, Cheng-Kang Chu, Xiao Tan, Duncan S. Wong, Chunming Tang, Jianying Zhou
2014 Theoretical Computer Science  
The scheme is proven secure against selective identity and chosen-ciphertext attacks and collusion resistant in the standard model.  ...  Generally speaking, given a re-encryption key rk A.1→ A.2 the proxy is allowed to re-encrypt all A.1's ciphertexts stored in the cloud to A.2 without any discrimination.  ...  To hide the condition from proxy, Fang, Susilo and Wang [12] proposed a CCA-secure CPRE with condition anonymity in the standard model.  ... 
doi:10.1016/j.tcs.2014.04.027 fatcat:bnb3r6dravdgdpr7jshofemds4

Type-Based Proxy Re-encryption and Its Construction [chapter]

Qiang Tang
2008 Lecture Notes in Computer Science  
We propose two type-based proxy re-encryption schemes: one is CPA secure with ciphertext privacy while the other is CCA secure without ciphertext privacy.  ...  In existing proxy re-encryption schemes, the delegatee can decrypt all ciphertexts for the delegator after re-encryption by the proxy.  ...  In Section 5 we present the IND-PR-CCA secure type-based proxy re-encryption scheme without ciphertext privacy and prove its security. In Section 6 we conclude the paper.  ... 
doi:10.1007/978-3-540-89754-5_11 fatcat:k37i2v2edbevxb7qby6n3i4fyi


S. Sree Vivek, S. Sharmila Deva Selvi, V. Radhakishan, C. Pandu Rangan
2012 Zenodo  
In [14], Jian Weng and others introduced the notion of conditional proxy re-encryption (C-PRE) with bilinear pairings.  ...  In a proxy re-encryption (PRE) scheme, Alice gives a special information to a proxy that allows it to transform messages encrypted under Alice's public key into a encryption under Bob's public key such  ...  MODEL OF CONDITIONAL PROXY RE-ENCRYPTION We give the definitions and security notions for C-PRE systems in this section.  ... 
doi:10.5281/zenodo.3353829 fatcat:hyybwar64nfizbhvyamh5vnqxy
« Previous Showing results 1 — 15 out of 157 results