Improved proxy re-encryption schemes with applications to secure distributed storage
ACM Transactions on Information and System Security (TISSEC)
Chosen-ciphertext secure proxy re-encryption
Proceedings of the 14th ACM conference on Computer and communications security
Identity-Based Proxy Re-encryption
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
RSA-TBOS signcryption with proxy re-encryption
Proceedings of the 8th ACM workshop on Digital rights management
Chosen-Ciphertext Secure Proxy Re-encryption without Pairings
CANS '08 Proceedings of the 7th International Conference on Cryptology and Network Security
CCA-Secure Proxy Re-encryption without Pairings
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Dual System Encryption: Realizing Fully Secure IBE and HIBE under Simple Assumptions
CRYPTO '09 Proceedings of the 29th Annual International Cryptology Conference on Advances in Cryptology
Unidirectional chosen-ciphertext secure proxy re-encryption
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Multi-use and unidirectional identity-based proxy re-encryption schemes
Information Sciences: an International Journal
CCA proxy re-encryption without bilinear maps in the standard model
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
Efficient unidirectional proxy re-encryption
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Identity-based proxy re-encryption without random oracles
ISC'07 Proceedings of the 10th international conference on Information Security
Anonymous ID-based proxy re-encryption
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Hi-index | 0.07 |
At ACNS 2007, Ateniese and Green proposed the concept of ID-based proxy re-encryption (IBPRE), where a semi-trusted proxy with some information (a.k.a. re-encryption key), can transform a ciphertext under an identity to another ciphertext under another identity with the same plaintext. However, the proxy cannot obtain the plaintext. Recently, Wang et al. revisited this primitive by allowing the chosen ciphertext attack when the ciphertext could be transformed several times. They also proposed a concrete multi-use unidirectional ID-based proxy re-encryption (MUIBPRE) scheme, which is proven secure in the random oracle. Nonetheless, they left the problem of constructing a multi-use unidirectional IBPRE scheme in the standard model. What is worse, their scheme cannot resist the collusion attack, which is an important security requirement for unidirectional proxy re-encryption. To solve this problem, in this paper we present a conversion from non-anonymous hierarchical identity-based encryption (NaHIBE) with strongly CPA security to CCA-secure and collusion-resistant MUIBPRE. Furthermore, based on the NaHIBE scheme proposed by Waters at Crypto'09, we give the first CCA-secure and collusion-resistant MUIBPRE scheme in the standard model.