Group-Based Proxy Re-encryption Scheme

被引:0
|
作者
Ma, Chunbo [1 ]
Ao, Jun [1 ]
机构
[1] Guilin Univ Elect Technol, Sch Informat & Commun, Guilin 541004, Guangxi, Peoples R China
关键词
group-based; proxy; re-encryption; standard model; V-DDH assumption;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, proxy re-encryption scheme received much attention. A proxy re-encryption used for divert ciphertext from one group to another without revealing underlying plaintext is proposed in this paper. The scheme is bidirectional and any member can independently decrypt the ciphertext encrypted to its group. The security of the proposed scheme is discussed and proofs are given to show that the scheme withstands chosen ciphertext attack in standard model.
引用
收藏
页码:1025 / 1034
页数:10
相关论文
共 50 条
  • [1] Group-based unidirectional proxy re-encryption scheme
    School of Information and Communication, Guilin University of Electronic and Technology, Guilin, Guangxi, 541004, China
    [J]. Inf. Technol. J., 2009, 1 (83-88):
  • [2] Group-based proxy re-encryption scheme secure against chosen ciphertext attack
    Ma, Chunbo
    Ao, Jun
    [J]. International Journal of Network Security, 2009, 8 (03) : 266 - 270
  • [3] A proxy re-encryption scheme based on elliptic curve group
    [J]. Yin, Shou-Lin (352720214@qq.com), 1600, Ubiquitous International (08):
  • [4] Proxy Re-encryption Scheme Based on SK Identity Based Encryption
    Wang, Xu An
    Yang, Xiaoyuan
    [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 657 - 660
  • [5] On the Insecurity of an Identity Based Proxy Re-encryption Scheme
    Wang, Xu An
    Yang, Xiaoyuan
    [J]. FUNDAMENTA INFORMATICAE, 2010, 98 (2-3) : 277 - 281
  • [6] Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption
    Mizuno, Takeo
    Doi, Hiroshi
    [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 288 - +
  • [7] Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    [J]. INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 564 - 575
  • [8] A new RSA-based proxy re-encryption scheme
    Wang, Liangliang
    Chen, Kefei
    Long, Yu
    Mao, Xianping
    [J]. Journal of Computational Information Systems, 2015, 11 (02): : 567 - 575
  • [9] Identity Based Proxy Re-encryption Scheme under LWE
    Yin, Wei
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zheng Ping
    [J]. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12): : 6116 - 6132
  • [10] Proxy Re-Encryption Based on Homomorphic Encryption
    Bellafqira, Reda
    Coatrieux, Gouenou
    Bouslimi, Dalel
    Quellec, Gwenole
    Cozic, Michel
    [J]. 33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161