Abstract
In proxy re-encryption (PRE), a semi-trusted proxy can transform a ciphertext under the delegator's public key into another ciphertext that the delegatee can decrypt by his/her own private key. However, the proxy cannot access the plaintext. Due to its transformation property, proxy re-encryption can be used in many applications, such as encrypted email forwarding. Some of these applications require that the underlying PRE scheme is CCA-secure and key-private. However, to the best of our knowledge, none of the existing PRE schemes satisfy this security requirement in the standard model. In this paper, based on the 5-Extended Decision Bilinear Diffie-Hellman assumption and Decision Diffie-Hellman assumption, we propose the first such PRE scheme, which solves an open problem left by Ateniese et al. (2009).
| Original language | English (US) |
|---|---|
| Pages (from-to) | 655-665 |
| Number of pages | 11 |
| Journal | Journal of Systems and Software |
| Volume | 85 |
| Issue number | 3 |
| DOIs | |
| State | Published - Mar 2012 |
All Science Journal Classification (ASJC) codes
- Software
- Information Systems
- Hardware and Architecture
Fingerprint
Dive into the research topics of 'Achieving key privacy without losing CCA security in proxy re-encryption'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver