A public key cryptosystem and a signature scheme based on discrete logarithms
Proceedings of CRYPTO 84 on Advances in cryptology
On the Exact Security of Full Domain Hash
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Improved proxy re-encryption schemes with applications to secure distributed storage
ACM Transactions on Information and System Security (TISSEC)
Chosen-ciphertext secure proxy re-encryption
Proceedings of the 14th ACM conference on Computer and communications security
Identity-Based Proxy Re-encryption
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Tracing Malicious Proxies in Proxy Re-encryption
Pairing '08 Proceedings of the 2nd international conference on Pairing-Based Cryptography
Proxy Re-signatures in the Standard Model
ISC '08 Proceedings of the 11th international conference on Information Security
Multi-use unidirectional proxy re-signatures
Proceedings of the 15th ACM conference on Computer and communications security
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
CCA-Secure Proxy Re-encryption without Pairings
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Key-Private Proxy Re-encryption
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Conditional Proxy Broadcast Re-Encryption
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Securely obfuscating re-encryption
TCC'07 Proceedings of the 4th conference on Theory of cryptography
Unidirectional chosen-ciphertext secure proxy re-encryption
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Identity-based proxy re-encryption without random oracles
ISC'07 Proceedings of the 10th international conference on Information Security
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
Information Sciences: an International Journal
On the security of a bidirectional proxy re-encryption scheme from PKC 2010
PKC'11 Proceedings of the 14th international conference on Practice and theory in public key cryptography conference on Public key cryptography
Interactive conditional proxy re-encryption with fine grain policy
Journal of Systems and Software
Unforgeability of re-encryption keys against collusion attack in proxy re-encryption
IWSEC'11 Proceedings of the 6th International conference on Advances in information and computer security
Achieving key privacy without losing CCA security in proxy re-encryption
Journal of Systems and Software
Hierarchical conditional proxy re-encryption
Computer Standards & Interfaces
Addressing leakage of re-encryption key in proxy re-encryption using trusted computing
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Generic construction of chosen ciphertext secure proxy re-encryption
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
Information Sciences: an International Journal
Security and Communication Networks
Privacy preserving protocol for service aggregation in cloud computing
Software—Practice & Experience
Anonymous ID-based proxy re-encryption
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search
Theoretical Computer Science
Identity-based data storage in cloud computing
Future Generation Computer Systems
Proxy re-encryption in a stronger security model extended from CT-RSA2012
CT-RSA'13 Proceedings of the 13th international conference on Topics in Cryptology
On the security of two multi-use CCA-secure proxy re-encryption schemes
International Journal of Intelligent Information and Database Systems
Hi-index | 0.00 |
Proxy re-encryption (PRE) allows a semi-trusted proxy to convert a ciphertext originally intended for Alice into one encrypting the same plaintext for Bob. The proxy only needs a re-encryption key given by Alice, and cannot learn anything about the plaintext encrypted. This adds flexibility in various applications, such as confidential email, digital right management and distributed storage. In this paper, we study unidirectional PRE, which the re-encryption key only enables delegation in one direction but not the opposite. In PKC 2009, Shao and Cao proposed a unidirectional PRE assuming the random oracle. However, we show that it is vulnerable to chosen-ciphertext attack (CCA). We then propose an efficient unidirectional PRE scheme (without resorting to pairings). We gain high efficiency and CCA-security using the “token-controlled encryption” technique, under the computational Diffie-Hellman assumption, in the random oracle model and a relaxed but reasonable definition.