Constant-Size CCA-Secure Multi-hop Unidirectional Proxy Re-encryption from Indistinguishability Obfuscation

被引:5
|
作者
Lai, Junzuo [1 ,2 ]
Huang, Zhengan [3 ]
Au, Man Ho [4 ]
Mao, Xianping [5 ]
机构
[1] Jinan Univ, Guangzhou, Peoples R China
[2] State Key Lab Cryptol, Beijing, Peoples R China
[3] Guangzhou Univ, Guangzhou, Peoples R China
[4] Hong Kong Polytech Univ, Hung Hom, Hong Kong, Peoples R China
[5] ZhongAn Informat Technol Serv Co Ltd, Shanghai, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Multi-hop; Unidirectional proxy re-encryption; Chosen-ciphertext attack; Indistinguishability obfuscation;
D O I
10.1007/978-3-319-93638-3_49
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we utilize the recent advances in indistinguishability obfuscation, overcome several obstacles and propose a multihop unidirectional proxy re-encryption scheme. The proposed scheme is proved to be CCA-secure in the standard model (i.e., without using the random oracle heuristic), and its ciphertext remains constant-size regardless of how many times it has been transformed.
引用
收藏
页码:805 / 812
页数:8
相关论文
共 50 条
  • [31] CCA secure and efficient proxy re-encryption scheme without bilinear pairing
    Prasad, Shilpee
    Purushothama, B.R.
    [J]. Journal of Information Security and Applications, 2021, 58
  • [32] Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption
    Liang, Kaitai
    Susilo, Willy
    Liu, Joseph K.
    Wong, Duncan S.
    [J]. Computer Journal, 2014, 58 (10): : 2778 - 2792
  • [33] CCA Secure Proxy Re-Encryption Scheme for Secure Sharing of Files through Cloud Storage
    Mishra, Bharati
    Jena, Debsish
    [J]. PROCEEDINGS OF 2018 FIFTH INTERNATIONAL CONFERENCE ON EMERGING APPLICATIONS OF INFORMATION TECHNOLOGY (EAIT), 2018,
  • [34] Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption
    Liang, Kaitai
    Susilo, Willy
    Liu, Joseph K.
    Wong, Duncan S.
    [J]. COMPUTER JOURNAL, 2015, 58 (10): : 2778 - 2792
  • [35] Secure Proxy Re-Encryption from CBE to IBE
    CHEN Yan
    [J]. Wuhan University Journal of Natural Sciences, 2008, (06) : 657 - 661
  • [36] Towards Multi-Hop Homomorphic Identity-Based Proxy Re-Encryption via Branching Program
    Li, Zengpeng
    Ma, Chunguang
    Wang, Ding
    [J]. IEEE ACCESS, 2017, 5 : 16214 - 16228
  • [37] CCA2 secure biometric identity based encryption with constant-size ciphertext
    Yang Yang
    Yu-pu Hu
    Le-you Zhang
    Chun-hui Sun
    [J]. Journal of Zhejiang University SCIENCE C, 2011, 12 : 819 - 827
  • [39] An Identity-Based Proxy Re-Encryption Scheme With Single-Hop Conditional Delegation and Multi-Hop Ciphertext Evolution for Secure Cloud Data Sharing
    Yao, Shimao
    Dayot, Ralph Voltaire J.
    Ra, In-Ho
    Xu, Liya
    Mei, Zhuolin
    Shi, Jiaoli
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 3833 - 3848
  • [40] A CCA-secure key-policy attribute-based proxy re-encryption in the adaptive corruption model for dropbox data sharing system
    Chunpeng Ge
    Willy Susilo
    Liming Fang
    Jiandong Wang
    Yunqing Shi
    [J]. Designs, Codes and Cryptography, 2018, 86 : 2587 - 2603