Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1109/CIT.2010.234guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy

Published: 29 June 2010 Publication History

Abstract

Proxy re-encryption is a useful cryptographic primitive, which allows a proxy to transform a ciphertext for Alice to another ciphertext of the same plaintext for Bob. Type-based proxy re-encryption is a specific kind of proxy re-encryption, where the proxy is restricted to transform only a subset of Alice's ciphertexts. This restriction is very useful in the situation where the fine-grained transformation is required. Some applications of type-based proxy re-encryption require that the underlying scheme simultaneously achieves CCA Security and Invisible Proxy. However, to the best of our knowledge, no such scheme has been proposed. In this paper, we propose the first type-based proxy re-encryption scheme that satisfies both requirements. The CCA security proof of our proposal is given in the random oracle model based on the decisional bilinear Diffie-Hellman (DBDH) assumption, extended decisional bilinear Diffie-Hellman inversion (eDBDHI) assumption, and extended decisional linear (eDL) assumption. Furthermore, our proposal holds the invisible proxy requirement unconditionally.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CIT '10: Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology
June 2010
3002 pages
ISBN:9780769541082

Publisher

IEEE Computer Society

United States

Publication History

Published: 29 June 2010

Author Tags

  1. CCA security
  2. Type-based proxy re-encryption
  3. invisible proxy

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2021)KAPREJournal of Information Security and Applications10.1016/j.jisa.2021.10300963:COnline publication date: 1-Dec-2021
  • (2019)Offline privacy preserving proxy re-encryption in mobile cloud computingPervasive and Mobile Computing10.1016/j.pmcj.2019.10108159:COnline publication date: 1-Oct-2019
  • (2018)PRE+International Journal of Web and Grid Services10.1504/IJWGS.2018.08839414:1(44-69)Online publication date: 1-Jan-2018
  • (2016)Proxy Re-encryption with Delegatable VerifiabilityProceedings, Part II, of the 21st Australasian Conference on Information Security and Privacy - Volume 972310.1007/978-3-319-40367-0_8(120-133)Online publication date: 4-Jul-2016
  • (2016)On the application of generic CCA-secure transformations to proxy re-encryptionSecurity and Communication Networks10.1002/sec.14349:12(1769-1785)Online publication date: 1-Aug-2016
  • (2014)Improved anonymous proxy re-encryption with CCA securityProceedings of the 9th ACM symposium on Information, computer and communications security10.1145/2590296.2590322(249-258)Online publication date: 4-Jun-2014
  • (2012)Anonymous ID-based proxy re-encryptionProceedings of the 17th Australasian conference on Information Security and Privacy10.1007/978-3-642-31448-3_27(364-375)Online publication date: 9-Jul-2012
  • (2012)Anonymous proxy re-encryptionSecurity and Communication Networks10.1002/sec.3265:5(439-449)Online publication date: 1-May-2012

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media