Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption

被引:0
|
作者
Sur, Chul [1 ]
Jung, Chae Duk [2 ]
Park, Youngho [2 ]
Rhee, Kyung Hyune [3 ]
机构
[1] Pukyong Natl Univ, Dept Comp Sci, 599-1,Daeyeon3 Dong, Pusan 608737, South Korea
[2] Pukyong Natl Univ, Dept Informat Security, Pusan 608737, South Korea
[3] Pukyong Natl Univ, Dept Informat Technol Convergence & Applicat Engn, Pusan 608737, South Korea
关键词
Certificateless Public Key Encryption; Proxy Re-Encryption; Chosen Ciphertext Security; Bilinear Pairing; PUBLIC-KEY ENCRYPTION;
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we introduce the notion of certificateless proxy re-encryption and also give precise definitions for secure certificateless proxy re-encryption schemes. We present a concrete scheme based on bilinear pairing, which enjoys the advantages of certificateless public key cryptography while providing the functionalities of proxy re-encryption. Moreover, the proposed scheme is unidirectional and compatible with current certificateless encryption deployments. Finally, we show that our scheme has chosen ciphertext security in the random oracle model.
引用
收藏
页码:214 / +
页数:3
相关论文
共 50 条
  • [41] Efficient chosen-ciphertext secure identity-based encryption with wildcards
    Birkett, James
    Dent, Alexander W.
    Neven, Gregory
    Schuldt, Jacob C. N.
    [J]. INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2007, 4586 : 274 - +
  • [42] Efficient and Provably-Secure Certificateless Proxy Re-encryption Scheme for Secure Cloud Data Sharing
    王亮亮
    陈克非
    毛贤平
    王永涛
    [J]. Journal of Shanghai Jiaotong University(Science), 2014, 19 (04) : 398 - 405
  • [43] Efficient and provably-secure certificateless proxy re-encryption scheme for secure cloud data sharing
    Wang L.-L.
    Chen K.-F.
    Mao X.-P.
    Wang Y.-T.
    [J]. Journal of Shanghai Jiaotong University (Science), 1600, Shanghai Jiaotong University (19): : 398 - 405
  • [44] A New and Improved Paradigm for Hybrid Encryption Secure Against Chosen-Ciphertext Attack
    Yvo Desmedt
    Rosario Gennaro
    Kaoru Kurosawa
    Victor Shoup
    [J]. Journal of Cryptology, 2010, 23 : 91 - 120
  • [45] Practical chosen-ciphertext secure Hierarchical Identity-Based Broadcast Encryption
    Liu, Weiran
    Liu, Jianwei
    Wu, Qianhong
    Qin, Bo
    Li, Yan
    [J]. INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (01) : 35 - 50
  • [46] Fully Secure Hidden Ciphertext-Policy Attribute-Based Proxy Re-encryption
    Feng, Xinyu
    Li, Cong
    Li, Dan
    Fang, Yuejian
    Shen, Qingni
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 192 - 204
  • [47] Ciphertext Policy Attribute-Based Proxy Re-encryption
    Luo, Song
    Hu, Jianbin
    Chen, Zhong
    [J]. INFORMATION AND COMMUNICATIONS SECURITY, 2010, 6476 : 401 - +
  • [48] Direct chosen-ciphertext secure hierarchical ID-Based encryption schemes
    Park, Jong Hwan
    Lee, Dong Hoon
    [J]. PUBLIC KEY INFRASTRUCTURE, PROCEEDINGS, 2007, 4582 : 94 - +
  • [49] Secure sharing of mobile personal healthcare records using certificateless proxy re-encryption in cloud
    Bhatia, Tarunpreet
    Verma, A. K.
    Sharma, Gaurav
    [J]. TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2018, 29 (06):
  • [50] An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing
    Selvi, S. Sharmila Deva
    Paul, Arinjita
    Rangan, Chandrasekaran Pandu
    [J]. PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 413 - 433