Identity-Based Encryption from the Weil Pairing
SIAM Journal on Computing
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Chosen-ciphertext secure proxy re-encryption
Proceedings of the 14th ACM conference on Computer and communications security
Identity-Based Proxy Re-encryption
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Type-Based Proxy Re-encryption and Its Construction
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
CCA-Secure Proxy Re-encryption without Pairings
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
Attribute based proxy re-encryption with delegating capabilities
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Conditional proxy re-encryption secure against chosen-ciphertext attack
Proceedings of the 4th International Symposium on Information, Computer, and Communications Security
Key-Private Proxy Re-encryption
CT-RSA '09 Proceedings of the The Cryptographers' Track at the RSA Conference 2009 on Topics in Cryptology
Inter-domain Identity-Based Proxy Re-encryption
Information Security and Cryptology
Conditional Proxy Broadcast Re-Encryption
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security
ISC '09 Proceedings of the 12th International Conference on Information Security
Anonymous Conditional Proxy Re-encryption without Random Oracle
ProvSec '09 Proceedings of the 3rd International Conference on Provable Security
Unidirectional chosen-ciphertext secure proxy re-encryption
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
Multi-use and unidirectional identity-based proxy re-encryption schemes
Information Sciences: an International Journal
CCA-Secure Type-based Proxy Re-encryption with Invisible Proxy
CIT '10 Proceedings of the 2010 10th IEEE International Conference on Computer and Information Technology
Achieving key privacy without losing CCA security in proxy re-encryption
Journal of Systems and Software
Efficient unidirectional proxy re-encryption
AFRICACRYPT'10 Proceedings of the Third international conference on Cryptology in Africa
Generic construction of chosen ciphertext secure proxy re-encryption
CT-RSA'12 Proceedings of the 12th conference on Topics in Cryptology
Information Sciences: an International Journal
Security and Communication Networks
Identity-based proxy re-encryption without random oracles
ISC'07 Proceedings of the 10th international conference on Information Security
Hi-index | 0.00 |
ID-based proxy re-encryption (IBPRE) allows a proxy with some information (a.k.a. re-encryption key) to transform the ciphertext under one identity to another ciphertext under another identity. These two ciphertexts can yield the same plaintext, while the proxy cannot get any information of the plaintext. Due to its transformable functionality, IBPRE can be used in many applications. Some of these applications require that the underlying IBPRE scheme is CCA-secure and anonymous. However, to the best of our knowledge, none of the existing schemes satisfy the security requirement. In this paper, we first extend the concept of IBPRE to that of anonymous IBPRE (AIBPRE), including the definition and security model. After that, we propose the first AIBPRE scheme, which can be proven-secure in the random oracle model based on the decisional bilinear Diffie-Hellman assumption and modified decisional bilinear Diffie-Hellman assumption.