efficient unidirectional proxy re-encryption
文献类型:会议论文
| 作者 | Chow Sherman S. M. ; Weng Jian ; Yang Yanjiang ; Deng Robert H. |
| 出版日期 | 2010 |
| 会议名称 | 3rd International Conference on Cryptology in Africa, AFRICACRYPT 2010 |
| 会议日期 | May 3, 201 |
| 会议地点 | Stellenbosch, South africa |
| 关键词 | Network security |
| 页码 | 316-332 |
| 英文摘要 | Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re-encryption key given by Alice, and cannot learn anything about the plaintext encrypted. This adds flexibility in various applications, such as confidential email, digital right management and distributed storage. In this paper, we study unidirectional PRE, which the re-encryption key only enables delegation in one direction but not the opposite. In PKC 2009, Shao and Cao proposed a unidirectional PRE assuming the random oracle. However, we show that it is vulnerable to chosen-ciphertext attack (CCA). We then propose an efficient unidirectional PRE scheme (without resorting to pairings). We gain high efficiency and CCA-security using the "token-controlled encryption" technique, under the computational Diffie-Hellman assumption, in the random oracle model and a relaxed but reasonable definition. © 2010 Springer-Verlag. |
| 收录类别 | EI |
| 会议录 | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
![]() |
| 会议录出版地 | Germany |
| 语种 | 英语 |
| ISSN号 | 3029743 |
| ISBN号 | 3642126774 |
| 源URL | [http://124.16.136.157/handle/311060/8744] ![]() |
| 专题 | 软件研究所_软件所图书馆_2010软件所会议论文 |
| 推荐引用方式 GB/T 7714 | Chow Sherman S. M.,Weng Jian,Yang Yanjiang,et al. efficient unidirectional proxy re-encryption[C]. 见:3rd International Conference on Cryptology in Africa, AFRICACRYPT 2010. Stellenbosch, South africa. May 3, 201. |
入库方式: OAI收割
来源:软件研究所
浏览0
下载0
收藏0
其他版本
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。

