CCA-secure type-based proxy re-encryption with Invisible Proxy

Xiaoqi Jia, Jun Shao, Jiwu Jing, Peng Liu

Research output: Chapter in Book/Report/Conference proceedingConference contribution

17 Scopus citations

Abstract

Proxy re-encryption is a useful cryptographic primitive, which allows a proxy to transform a ciphertext for Alice to another ciphertext of the same plaintext for Bob. Type-based proxy re-encryption is a specific kind of proxy re-encryption, where the proxy is restricted to transform only a subset of Alice's ciphertexts. This restriction is very useful in the situation where the fine-grained transformation is required. Some applications of type-based proxy re-encryption require that the underlying scheme simultaneously achieves CCA Security and Invisible Proxy. However, to the best of our knowledge, no such scheme has been proposed. In this paper, we propose the first type-based proxy re-encryption scheme that satisfies both requirements. The CCA security proof of our proposal is given in the random oracle model based on the decisional bilinear Diffie-Hellman (DBDH) assumption, extended decisional bilinear Diffie-Hellman inversion (eDBDHI) assumption, and extended decisional linear (eDL) assumption. Furthermore, our proposal holds the invisible proxy requirement unconditionally.

Original languageEnglish (US)
Title of host publicationProceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010
Pages1299-1305
Number of pages7
DOIs
StatePublished - Nov 19 2010
Event10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable Computing and Communications, ScalCom-2010 - Bradford, United Kingdom
Duration: Jun 29 2010Jul 1 2010

Publication series

NameProceedings - 10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, ScalCom-2010

Other

Other10th IEEE International Conference on Computer and Information Technology, CIT-2010, 7th IEEE International Conference on Embedded Software and Systems, ICESS-2010, 10th IEEE Int. Conf. Scalable Computing and Communications, ScalCom-2010
Country/TerritoryUnited Kingdom
CityBradford
Period6/29/107/1/10

All Science Journal Classification (ASJC) codes

  • Computational Theory and Mathematics
  • Computer Networks and Communications
  • Software

Fingerprint

Dive into the research topics of 'CCA-secure type-based proxy re-encryption with Invisible Proxy'. Together they form a unique fingerprint.

Cite this