메뉴 건너뛰기




Volumn 7839 LNCS, Issue , 2013, Pages 231-246

A CCA-secure identity-based conditional proxy re-encryption without random oracles

Author keywords

Identity Based Encryption; Single Hop; Standard Model; Unidirectional Conditional Proxy Re encryption

Indexed keywords

CHOSEN CIPHERTEXT ATTACK; CONDITIONAL PROXY RE ENCRYPTIONS; IDENTITY BASED ENCRYPTION; PROXY RE ENCRYPTIONS; SINGLE HOP; STANDARD MODEL; THE STANDARD MODEL; WITHOUT RANDOM ORACLES;

EID: 84875985547     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-37682-5_17     Document Type: Conference Paper
Times cited : (42)

References (26)
  • 1
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1-30 (2006)
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 2
    • 38049024484 scopus 로고    scopus 로고
    • Two-tier signatures, strongly unforgeable signatures, and fiat-shamir without random oracles
    • Okamoto, T., Wang, X. (eds.) PKC 2007. Springer, Heidelberg
    • Bellare, M., Shoup, S.: Two-tier signatures, strongly unforgeable signatures, and fiat-shamir without random oracles. In: Okamoto, T., Wang, X. (eds.) PKC 2007. LNCS, vol. 4450, pp. 201-216. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4450 , pp. 201-216
    • Bellare, M.1    Shoup, S.2
  • 3
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Advances in Cryptology - EUROCRYPT '98
    • Blaze, M., Bleumer, G., Strauss, M.J.: Divertible protocols and atomic proxy cryptography. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 127-144. Springer, Heidelberg (1998) (Pubitemid 128081481)
    • (1998) LECTURE NOTES IN COMPUTER SCIENCE , Issue.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 4
    • 35048841300 scopus 로고    scopus 로고
    • Efficient selective-ID secure identity-based encryption without random oracles
    • Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Boneh, D., Boyen, X.: Efficient selective-ID secure identity-based encryption without random oracles. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 223-238. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 223-238
    • Boneh, D.1    Boyen, X.2
  • 5
    • 84874324906 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Kilian, J. (ed.) CRYPTO 2001. Springer, Heidelberg
    • Boneh, D., Franklin,M.: Identity-based encryption from the weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213-229. Springer, Heidelberg (2001)
    • (2001) LNCS , vol.2139 , pp. 213-229
    • Boneh, D.1    Franklin, M.2
  • 6
    • 24144453101 scopus 로고    scopus 로고
    • Improved efficiency for CCA-secure cryptosystems built using identity-based encryption
    • Topics in Cryptology - CT-RSA 2005 - The Cryptographers' Track at the RSA Conference 2005
    • Boneh, D., Katz, J.: Improved efficiency for CCA-secure cryptosystems built using identity-based encryption. In: Menezes, A. (ed.) CT-RSA 2005. LNCS, vol. 3376, pp. 87-103. Springer, Heidelberg (2005) (Pubitemid 41235422)
    • (2005) Lecture Notes in Computer Science , vol.3376 , pp. 87-103
    • Boneh, D.1    Katz, J.2
  • 7
    • 35048852705 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. Springer, Heidelberg
    • Canetti, R., Halevi, S., Katz, J.: Chosen-ciphertext security from identity-based encryption. In: Cachin, C., Camenisch, J. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 207-222. Springer, Heidelberg (2004)
    • (2004) LNCS , vol.3027 , pp. 207-222
    • Canetti, R.1    Halevi, S.2    Katz, J.3
  • 8
    • 77952361637 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption
    • Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM
    • Canetti, R., Hohenberger, S.: Chosen-ciphertext secure proxy re-encryption. In: Ning, P., di Vimercati, S.D.C., Syverson, P.F. (eds.) ACM Conference on Computer and Communications Security, pp. 185-194. ACM (2007)
    • (2007) ACM Conference on Computer and Communications Security , pp. 185-194
    • Canetti, R.1    Hohenberger, S.2
  • 9
    • 38149038713 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption without random oracles
    • Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. Springer, Heidelberg
    • Chu, C.-K., Tzeng, W.-G.: Identity-based proxy re-encryption without random oracles. In: Garay, J.A., Lenstra, A.K., Mambo, M., Peralta, R. (eds.) ISC 2007. LNCS, vol. 4779, pp. 189-202. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4779 , pp. 189-202
    • Chu, C.-K.1    Tzeng, W.-G.2
  • 10
    • 84921068281 scopus 로고    scopus 로고
    • On the exact security of full domain hash
    • Bellare, M. (ed.) CRYPTO 2000. Springer, Heidelberg
    • Coron, J.S.: On the exact security of full domain hash. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 229-235. Springer, Heidelberg (2000)
    • (2000) LNCS , vol.1880 , pp. 229-235
    • Coron, J.S.1
  • 11
    • 80052812186 scopus 로고    scopus 로고
    • An identity-based proxy re-encryption scheme with source hiding property, and its application to a mailing-list system
    • Camenisch, J., Lambrinoudakis, C. (eds.) EuroPKI 2010. Springer, Heidelberg
    • Emura, K., Miyaji, A., Omote, K.: An identity-based proxy re-encryption scheme with source hiding property, and its application to a mailing-list system. In: Camenisch, J., Lambrinoudakis, C. (eds.) EuroPKI 2010. LNCS, vol. 6711, pp. 77-92. Springer, Heidelberg (2011)
    • (2011) LNCS , vol.6711 , pp. 77-92
    • Emura, K.1    Miyaji, A.2    Omote, K.3
  • 12
    • 0022793132 scopus 로고
    • How to construct random functions
    • Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792-807 (1986)
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 13
    • 38049061546 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption
    • Katz, J., Yung, M. (eds.) ACNS 2007. Springer, Heidelberg
    • Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Katz, J., Yung, M. (eds.) ACNS 2007. LNCS, vol. 4521, pp. 288-306. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4521 , pp. 288-306
    • Green, M.1    Ateniese, G.2
  • 14
    • 57949106557 scopus 로고    scopus 로고
    • Proxy cryptography revisited
    • The Internet Society
    • Ivan, A.A., Dodis, Y.: Proxy cryptography revisited. In: NDSS. The Internet Society (2003)
    • (2003) NDSS
    • Ivan, A.A.1    Dodis, Y.2
  • 15
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy re-encryption
    • Cramer, R. (ed.) PKC 2008. Springer, Heidelberg
    • Libert, B., Vergnaud, D.: Unidirectional chosen-ciphertext secure proxy re-encryption. In: Cramer, R. (ed.) PKC 2008. LNCS, vol. 4939, pp. 360-379. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.4939 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2
  • 16
    • 84864644840 scopus 로고    scopus 로고
    • Fully secure unidirectional identity-based proxy re-encryption
    • Kim, H. (ed.) ICISC 2011. Springer, Heidelberg
    • Luo, S., Shen, Q., Chen, Z.: Fully secure unidirectional identity-based proxy re-encryption. In: Kim, H. (ed.) ICISC 2011. LNCS, vol. 7259, pp. 109-126. Springer, Heidelberg (2012)
    • (2012) LNCS , vol.7259 , pp. 109-126
    • Luo, S.1    Shen, Q.2    Chen, Z.3
  • 17
    • 0030687206 scopus 로고    scopus 로고
    • Proxy cryptosystems: Delegation of the power to decrypt ciphertexts
    • Mambo, M., Okamoto, E.: Proxy cryptosystems: Delegation of the power to decrypt ciphertexts. IEICE Transactions E80-A(1), 54-63 (1997)
    • (1997) IEICE Transactions , vol.E80-A , Issue.1 , pp. 54-63
    • Mambo, M.1    Okamoto, E.2
  • 18
    • 50049099260 scopus 로고    scopus 로고
    • Proxy re-encryption systems for identity-based encryption
    • Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. Springer, Heidelberg
    • Matsuo, T.: Proxy re-encryption systems for identity-based encryption. In: Takagi, T., Okamoto, T., Okamoto, E., Okamoto, T. (eds.) Pairing 2007. LNCS, vol. 4575, pp. 247-267. Springer, Heidelberg (2007)
    • (2007) LNCS , vol.4575 , pp. 247-267
    • Matsuo, T.1
  • 19
    • 78650937188 scopus 로고    scopus 로고
    • Secure and efficient ibe-pke proxy re-encryption
    • Mizuno, T., Doi, H.: Secure and efficient ibe-pke proxy re-encryption. IEICE Transactions 94-A(1), 36-44 (2011)
    • (2011) IEICE Transactions , vol.94 A , Issue.1 , pp. 36-44
    • Mizuno, T.1    Doi, H.2
  • 20
    • 58549086614 scopus 로고    scopus 로고
    • Type-based proxy re-encryption and its construction
    • Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. Springer, Heidelberg
    • Tang, Q.: Type-based proxy re-encryption and its construction. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 130-144. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5365 , pp. 130-144
    • Tang, Q.1
  • 21
    • 67650109748 scopus 로고    scopus 로고
    • Inter-domain identity-based proxy re-encryption
    • Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. Springer, Heidelberg
    • Tang, Q., Hartel, P., Jonker, W.: Inter-domain identity-based proxy re-encryption. In: Yung, M., Liu, P., Lin, D. (eds.) Inscrypt 2008. LNCS, vol. 5487, pp. 332-347. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5487 , pp. 332-347
    • Tang, Q.1    Hartel, P.2    Jonker, W.3
  • 22
    • 78650889838 scopus 로고    scopus 로고
    • Identity-based proxy cryptosystems with revocability and hierarchical confidentialities
    • Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. Springer, Heidelberg
    • Wang, L.,Wang, L., Mambo, M., Okamoto, E.: Identity-based proxy cryptosystems with revocability and hierarchical confidentialities. In: Soriano, M., Qing, S., López, J. (eds.) ICICS 2010. LNCS, vol. 6476, pp. 383-400. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6476 , pp. 383-400
    • Wang, L.1    Wang, L.2    Mambo, M.3    Okamoto, E.4
  • 23
    • 78650288030 scopus 로고    scopus 로고
    • New identity-based proxy re-encryption schemes to prevent collusion attacks
    • Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. Springer, Heidelberg
    • Wang, L., Wang, L., Mambo, M., Okamoto, E.: New identity-based proxy re-encryption schemes to prevent collusion attacks. In: Joye, M., Miyaji, A., Otsuka, A. (eds.) Pairing 2010. LNCS, vol. 6487, pp. 327-346. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6487 , pp. 327-346
    • Wang, L.1    Wang, L.2    Mambo, M.3    Okamoto, E.4
  • 24
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Cramer, R. (ed.) EUROCRYPT 2005. Springer, Heidelberg
    • Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114-127. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3494 , pp. 114-127
    • Waters, B.1
  • 25
    • 77952320634 scopus 로고    scopus 로고
    • Conditional proxy re-encryption secure against chosen-ciphertext attack
    • Li, W., Susilo, W., Tupakula, U.K., Safavi-Naini, R., Varadharajan, V. (eds.) ACM
    • Weng, J., Deng, R.H., Ding, X., Chu, C.K., Lai, J.: Conditional proxy re-encryption secure against chosen-ciphertext attack. In: Li, W., Susilo, W., Tupakula, U.K., Safavi-Naini, R., Varadharajan, V. (eds.) ASIACCS, pp. 322-332. ACM (2009)
    • (2009) ASIACCS , pp. 322-332
    • Weng, J.1    Deng, R.H.2    Ding, X.3    Chu, C.K.4    Lai, J.5
  • 26
    • 70350376239 scopus 로고    scopus 로고
    • Efficient conditional proxy re-encryption with chosen-ciphertext security
    • Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. Springer, Heidelberg
    • Weng, J., Yang, Y., Tang, Q., Deng, R.H., Bao, F.: Efficient conditional proxy re-encryption with chosen-ciphertext security. In: Samarati, P., Yung, M., Martinelli, F., Ardagna, C.A. (eds.) ISC 2009. LNCS, vol. 5735, pp. 151-166. Springer, Heidelberg (2009)
    • (2009) LNCS , vol.5735 , pp. 151-166
    • Weng, J.1    Yang, Y.2    Tang, Q.3    Deng, R.H.4    Bao, F.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.