Achieving key privacy without losing CCA security in proxy re-encryption

Jun Shao, Peng Liu, Yuan Zhou

Research output: Contribution to journalArticlepeer-review

18 Scopus citations

Abstract

In proxy re-encryption (PRE), a semi-trusted proxy can transform a ciphertext under the delegator's public key into another ciphertext that the delegatee can decrypt by his/her own private key. However, the proxy cannot access the plaintext. Due to its transformation property, proxy re-encryption can be used in many applications, such as encrypted email forwarding. Some of these applications require that the underlying PRE scheme is CCA-secure and key-private. However, to the best of our knowledge, none of the existing PRE schemes satisfy this security requirement in the standard model. In this paper, based on the 5-Extended Decision Bilinear Diffie-Hellman assumption and Decision Diffie-Hellman assumption, we propose the first such PRE scheme, which solves an open problem left by Ateniese et al. (2009).

Original languageEnglish (US)
Pages (from-to)655-665
Number of pages11
JournalJournal of Systems and Software
Volume85
Issue number3
DOIs
StatePublished - Mar 2012

All Science Journal Classification (ASJC) codes

  • Software
  • Information Systems
  • Hardware and Architecture

Fingerprint

Dive into the research topics of 'Achieving key privacy without losing CCA security in proxy re-encryption'. Together they form a unique fingerprint.

Cite this