Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation

被引:5
|
作者
Lai, Junzuo [1 ,2 ]
Huang, Zhengan [3 ]
Au, Man Ho [4 ]
Mao, Xianping [5 ]
机构
[1] Jinan Univ, Guangzhou, Peoples R China
[2] State Key Lab Cryptol, Beijing, Peoples R China
[3] Guangzhou Univ, Guangzhou, Peoples R China
[4] Hong Kong Polytech Univ, Hung Hom, Hong Kong, Peoples R China
[5] ZhongAn Informat Technol Serv Co Ltd, Shanghai, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Multi-hop; Unidirectional proxy re-encryption; Chosen-ciphertext attack; Indistinguishability obfuscation;
D O I
10.1007/978-3-319-93638-3_49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we utilize the recent advances in indistinguishability obfuscation, overcome several obstacles and propose a multihop unidirectional proxy re-encryption scheme. The proposed scheme is proved to be CCA-secure in the standard model (i.e., without using the random oracle heuristic), and its ciphertext remains constant-size regardless of how many times it has been transformed.
引用
收藏
页码:805 / 812
页数:8
相关论文
共 50 条
  • [1] Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
    Lai, Junzuo
    Huang, Zhengan
    Au, Man Ho
    Mao, Xianping
    [J]. THEORETICAL COMPUTER SCIENCE, 2020, 847 : 1 - 16
  • [2] CCA-Secure Proxy Re-encryption without Pairings
    Shao, Jun
    Cao, Zhenfu
    [J]. PUBLIC KEY CRYPTOGRAPHY-PKC 2009, PROCEEDINGS, 2009, 5443 : 357 - 376
  • [3] A Multi-use CCA-secure Proxy Re-encryption Scheme
    Cai, Yi
    Liu, Xudong
    [J]. 2014 IEEE 12TH INTERNATIONAL CONFERENCE ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING (DASC)/2014 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED COMPUTING (EMBEDDEDCOM)/2014 IEEE 12TH INTERNATIONAL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING (PICOM), 2014, : 39 - +
  • [4] Multi-Hop Unidirectional Proxy Re-Encryption from Multilinear Maps
    Tang, Fei
    Li, Hongda
    Chang, Jinyong
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (02) : 762 - 766
  • [5] Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
    Liang, Kaitai
    Chu, Cheng-Kang
    Tan, Xiao
    Wong, Duncan S.
    Tang, Chunming
    Zhou, Jianying
    [J]. THEORETICAL COMPUTER SCIENCE, 2014, 539 : 87 - 105
  • [6] Restricted CCA-secure Bidirectional Proxy Re-encryption Scheme
    Guo, Duntao
    Wang, Xu An
    Zhang, Minqing
    Yang, Xiaoyuan
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 5, 2010, : 678 - 681
  • [7] Cryptanalysis of A Multi-use CCA-secure Proxy Re-encryption Scheme
    Cai, Yi
    Qi, Deyu
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2014, 8 (04): : 161 - 169
  • [8] On the application of generic CCA-secure transformations to proxy re-encryption
    Nunez, David
    Agudo, Isaac
    Lopez, Javier
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1769 - 1785
  • [9] CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
    Weng Jian
    Chen MinRong
    Yang YanJiang
    Deng, Robert
    Chen Kefei
    Bao Feng
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (03) : 593 - 606
  • [10] More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles
    Wang, Hongbing
    Cao, Zhenfu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (02) : 173 - 181