메뉴 건너뛰기




Volumn 539, Issue C, 2014, Pages 87-105

Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts

Author keywords

Bilinear map; Chosen ciphertext security; Conditional proxy re encryption; Constant size ciphertext; Identity based proxy re encryption

Indexed keywords

SECURITY OF DATA;

EID: 84907463015     PISSN: 03043975     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.tcs.2014.04.027     Document Type: Article
Times cited : (45)

References (38)
  • 1
    • 33745218758 scopus 로고    scopus 로고
    • Improved proxy re-encryption schemes with applications to secure distributed storage
    • Ateniese G., Fu K., Green M., Hohenberger S. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 2006, 9(1):1-30.
    • (2006) ACM Trans. Inf. Syst. Secur. , vol.9 , Issue.1 , pp. 1-30
    • Ateniese, G.1    Fu, K.2    Green, M.3    Hohenberger, S.4
  • 2
    • 38049024484 scopus 로고    scopus 로고
    • Two-tier signatures, strongly unforgeable signatures, and fiat-shamir without random oracles
    • Springer, T. Okamoto, X. Wang (Eds.) Public Key Cryptography
    • Bellare M., Shoup S. Two-tier signatures, strongly unforgeable signatures, and fiat-shamir without random oracles. Lect. Notes Comput. Sci. 2007, vol. 4450:201-216. Springer. T. Okamoto, X. Wang (Eds.).
    • (2007) Lect. Notes Comput. Sci. , vol.4450 , pp. 201-216
    • Bellare, M.1    Shoup, S.2
  • 3
    • 84957718934 scopus 로고    scopus 로고
    • Divertible protocols and atomic proxy cryptography
    • Springer, K. Nyberg (Ed.)
    • Blaze M., Bleumer G., Strauss M. Divertible protocols and atomic proxy cryptography. Lect. Notes Comput. Sci. 1998, vol. 1403:127-144. Springer. K. Nyberg (Ed.).
    • (1998) Lect. Notes Comput. Sci. , vol.1403 , pp. 127-144
    • Blaze, M.1    Bleumer, G.2    Strauss, M.3
  • 4
    • 24944562007 scopus 로고    scopus 로고
    • Hierarchical identity based encryption with constant size ciphertext
    • Springer, R. Cramer (Ed.)
    • Boneh D., Boyen X., Goh E.-J. Hierarchical identity based encryption with constant size ciphertext. Lect. Notes Comput. Sci. 2005, vol. 3494:440-456. Springer. R. Cramer (Ed.).
    • (2005) Lect. Notes Comput. Sci. , vol.3494 , pp. 440-456
    • Boneh, D.1    Boyen, X.2    Goh, E.-J.3
  • 5
    • 33745854208 scopus 로고    scopus 로고
    • Chosen-ciphertext security from identity-based encryption
    • Boneh D., Canetti R., Halevi S., Katz J. Chosen-ciphertext security from identity-based encryption. SIAM J. Comput. 2007, 36(5):1301-1328.
    • (2007) SIAM J. Comput. , vol.36 , Issue.5 , pp. 1301-1328
    • Boneh, D.1    Canetti, R.2    Halevi, S.3    Katz, J.4
  • 6
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the weil pairing
    • Boneh D., Franklin M.K. Identity-based encryption from the weil pairing. SIAM J. Comput. 2003, 32(3):586-615.
    • (2003) SIAM J. Comput. , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.K.2
  • 8
    • 35248875326 scopus 로고    scopus 로고
    • Relaxing chosen-ciphertext security
    • Springer, D. Boneh (Ed.)
    • Canetti R., Krawczyk H., Nielsen J.B. Relaxing chosen-ciphertext security. Lect. Notes Comput. Sci. 2003, vol. 2729:565-582. Springer. D. Boneh (Ed.).
    • (2003) Lect. Notes Comput. Sci. , vol.2729 , pp. 565-582
    • Canetti, R.1    Krawczyk, H.2    Nielsen, J.B.3
  • 9
    • 38149038713 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption without random oracles
    • Springer, J.A. Garay, A.K. Lenstra, M. Mambo, R. Peralta (Eds.)
    • Chu C.-K., Tzeng W.-G. Identity-based proxy re-encryption without random oracles. Lect. Notes Comput. Sci. 2007, vol. 4779:189-202. Springer. J.A. Garay, A.K. Lenstra, M. Mambo, R. Peralta (Eds.).
    • (2007) Lect. Notes Comput. Sci. , vol.4779 , pp. 189-202
    • Chu, C.-K.1    Tzeng, W.-G.2
  • 10
    • 1842616017 scopus 로고    scopus 로고
    • Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack
    • Cramer R., Shoup V. Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 2003, 33(1):167-226.
    • (2003) SIAM J. Comput. , vol.33 , Issue.1 , pp. 167-226
    • Cramer, R.1    Shoup, V.2
  • 11
    • 58449122500 scopus 로고    scopus 로고
    • Chosen-ciphertext secure proxy re-encryption without pairings
    • Springer, M.K. Franklin, L.C.K. Hui, D.S. Wong (Eds.)
    • Deng R.H., Weng J., Liu S., Chen K. Chosen-ciphertext secure proxy re-encryption without pairings. Lect. Notes Comput. Sci. 2008, vol. 5339:1-17. Springer. M.K. Franklin, L.C.K. Hui, D.S. Wong (Eds.).
    • (2008) Lect. Notes Comput. Sci. , vol.5339 , pp. 1-17
    • Deng, R.H.1    Weng, J.2    Liu, S.3    Chen, K.4
  • 12
    • 78249251589 scopus 로고    scopus 로고
    • Anonymous conditional proxy re-encryption without random oracle
    • Springer, J. Pieprzyk, F. Zhang (Eds.)
    • Fang L., Susilo W., Wang J. Anonymous conditional proxy re-encryption without random oracle. Lect. Notes Comput. Sci. 2009, vol. 5848:47-60. Springer. J. Pieprzyk, F. Zhang (Eds.).
    • (2009) Lect. Notes Comput. Sci. , vol.5848 , pp. 47-60
    • Fang, L.1    Susilo, W.2    Wang, J.3
  • 13
    • 0022793132 scopus 로고
    • How to construct random functions
    • Goldreich O., Goldwasser S., Micali S. How to construct random functions. J. ACM 1986, 33(4):792-807.
    • (1986) J. ACM , vol.33 , Issue.4 , pp. 792-807
    • Goldreich, O.1    Goldwasser, S.2    Micali, S.3
  • 14
    • 38049061546 scopus 로고    scopus 로고
    • Identity-based proxy re-encryption
    • Springer, J. Katz, M. Yung (Eds.)
    • Green M., Ateniese G. Identity-based proxy re-encryption. Lect. Notes Comput. Sci. 2007, vol. 4521:288-306. Springer. J. Katz, M. Yung (Eds.).
    • (2007) Lect. Notes Comput. Sci. , vol.4521 , pp. 288-306
    • Green, M.1    Ateniese, G.2
  • 15
    • 84863280137 scopus 로고    scopus 로고
    • Generic construction of chosen ciphertext secure proxy re-encryption
    • Springer, O. Dunkelman (Ed.)
    • Hanaoka G., Kawai Y., Kunihiro N., Matsuda T., Weng J., Zhang R., Zhao Y. Generic construction of chosen ciphertext secure proxy re-encryption. Lect. Notes Comput. Sci. 2012, vol. 7178:349-364. Springer. O. Dunkelman (Ed.).
    • (2012) Lect. Notes Comput. Sci. , vol.7178 , pp. 349-364
    • Hanaoka, G.1    Kawai, Y.2    Kunihiro, N.3    Matsuda, T.4    Weng, J.5    Zhang, R.6    Zhao, Y.7
  • 16
    • 84874289731 scopus 로고    scopus 로고
    • Proxy re-encryption in a stronger security model extended from CT-RSA 2012
    • Springer
    • Isshiki T., Nguyen M.H., Tanaka K. Proxy re-encryption in a stronger security model extended from CT-RSA 2012. Lect. Notes Comput. Sci. 2013, vol. 7779:277-292. Springer.
    • (2013) Lect. Notes Comput. Sci. , vol.7779 , pp. 277-292
    • Isshiki, T.1    Nguyen, M.H.2    Tanaka, K.3
  • 17
    • 84890956841 scopus 로고    scopus 로고
    • Factoring-based proxy re-encryption schemes
    • Springer, W. Susilo, R. Reyhanitabar (Eds.)
    • Isshiki T., Nguyen M.H., Tanaka K. Factoring-based proxy re-encryption schemes. Lect. Notes Comput. Sci. 2013, vol. 8209:309-329. Springer. W. Susilo, R. Reyhanitabar (Eds.).
    • (2013) Lect. Notes Comput. Sci. , vol.8209 , pp. 309-329
    • Isshiki, T.1    Nguyen, M.H.2    Tanaka, K.3
  • 18
    • 57949106557 scopus 로고    scopus 로고
    • Proxy cryptography revisited
    • The Internet Society
    • Ivan A.-A., Dodis Y. Proxy cryptography revisited. NDSS 2003, The Internet Society.
    • (2003) NDSS
    • Ivan, A.-A.1    Dodis, Y.2
  • 19
    • 84875985547 scopus 로고    scopus 로고
    • A CCA-secure identity-based conditional proxy re-encryption without random oracles
    • Springer, Proceedings of the 15th ICISC
    • Liang K., Liu Z., Tan X., Wong D.S., Tang C. A CCA-secure identity-based conditional proxy re-encryption without random oracles. Lect. Notes Comput. Sci. 2013, vol. 7839:231-246. Springer.
    • (2013) Lect. Notes Comput. Sci. , vol.7839 , pp. 231-246
    • Liang, K.1    Liu, Z.2    Tan, X.3    Wong, D.S.4    Tang, C.5
  • 20
    • 40249113119 scopus 로고    scopus 로고
    • Unidirectional chosen-ciphertext secure proxy re-encryption
    • Springer, R. Cramer (Ed.)
    • Libert B., Vergnaud D. Unidirectional chosen-ciphertext secure proxy re-encryption. Lect. Notes Comput. Sci. 2008, vol. 4939:360-379. Springer. R. Cramer (Ed.).
    • (2008) Lect. Notes Comput. Sci. , vol.4939 , pp. 360-379
    • Libert, B.1    Vergnaud, D.2
  • 21
    • 84864644840 scopus 로고    scopus 로고
    • Fully secure unidirectional identity-based proxy re-encryption
    • Springer, Heidelberg, H. Kim (Ed.)
    • Luo S., Shen Q., Chen Z. Fully secure unidirectional identity-based proxy re-encryption. Lect. Notes Comput. Sci. 2011, vol. 7259:109-126. Springer, Heidelberg. H. Kim (Ed.).
    • (2011) Lect. Notes Comput. Sci. , vol.7259 , pp. 109-126
    • Luo, S.1    Shen, Q.2    Chen, Z.3
  • 22
    • 0030687206 scopus 로고    scopus 로고
    • Proxy cryptosystems: delegation of the power to decrypt ciphertexts
    • Mambo M., Okamoto E. Proxy cryptosystems: delegation of the power to decrypt ciphertexts. IEICE Trans. 1997, E80-A(1):54-63.
    • (1997) IEICE Trans. , vol.E80-A , Issue.1 , pp. 54-63
    • Mambo, M.1    Okamoto, E.2
  • 23
    • 77957655174 scopus 로고    scopus 로고
    • CCA proxy re-encryption without bilinear maps in the standard model
    • Springer, P.Q. Nguyen, D. Pointcheval (Eds.)
    • Matsuda T., Nishimaki R., Tanaka K. CCA proxy re-encryption without bilinear maps in the standard model. Lect. Notes Comput. Sci. 2010, vol. 6056:261-278. Springer. P.Q. Nguyen, D. Pointcheval (Eds.).
    • (2010) Lect. Notes Comput. Sci. , vol.6056 , pp. 261-278
    • Matsuda, T.1    Nishimaki, R.2    Tanaka, K.3
  • 24
    • 50049099260 scopus 로고    scopus 로고
    • Proxy re-encryption systems for identity-based encryption
    • Springer, T. Takagi, T. Okamoto, E. Okamoto, T. Okamoto (Eds.)
    • Matsuo T. Proxy re-encryption systems for identity-based encryption. Lect. Notes Comput. Sci. 2007, vol. 4575:247-267. Springer. T. Takagi, T. Okamoto, E. Okamoto, T. Okamoto (Eds.).
    • (2007) Lect. Notes Comput. Sci. , vol.4575 , pp. 247-267
    • Matsuo, T.1
  • 25
    • 78650937188 scopus 로고    scopus 로고
    • Secure and efficient IBE-PKE proxy re-encryption
    • Mizuno T., Doi H. Secure and efficient IBE-PKE proxy re-encryption. IEICE Trans. 2011, 94-A(1):36-44.
    • (2011) IEICE Trans. , Issue.1 , pp. 36-44
    • Mizuno, T.1    Doi, H.2
  • 26
    • 24944554962 scopus 로고    scopus 로고
    • Fuzzy identity-based encryption
    • Springer, R. Cramer (Ed.)
    • Sahai A., Waters B. Fuzzy identity-based encryption. Lect. Notes Comput. Sci. 2005, vol. 3494:457-473. Springer. R. Cramer (Ed.).
    • (2005) Lect. Notes Comput. Sci. , vol.3494 , pp. 457-473
    • Sahai, A.1    Waters, B.2
  • 27
    • 84861582429 scopus 로고    scopus 로고
    • Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
    • Shao J., Cao Z. Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption. Inf. Sci. 2012, 206(0):83-95.
    • (2012) Inf. Sci. , vol.206 , Issue.0 , pp. 83-95
    • Shao, J.1    Cao, Z.2
  • 28
    • 58549086614 scopus 로고    scopus 로고
    • Type-based proxy re-encryption and its construction
    • Springer, D.R. Chowdhury, V. Rijmen, A. Das (Eds.)
    • Tang Q. Type-based proxy re-encryption and its construction. Lect. Notes Comput. Sci. 2008, vol. 5365:130-144. Springer. D.R. Chowdhury, V. Rijmen, A. Das (Eds.).
    • (2008) Lect. Notes Comput. Sci. , vol.5365 , pp. 130-144
    • Tang, Q.1
  • 29
    • 67650109748 scopus 로고    scopus 로고
    • Inter-domain identity-based proxy re-encryption
    • Springer, M. Yung, P. Liu, D. Lin (Eds.)
    • Tang Q., Hartel P.H., Jonker W. Inter-domain identity-based proxy re-encryption. Lect. Notes Comput. Sci. 2008, vol. 5487:332-347. Springer. M. Yung, P. Liu, D. Lin (Eds.).
    • (2008) Lect. Notes Comput. Sci. , vol.5487 , pp. 332-347
    • Tang, Q.1    Hartel, P.H.2    Jonker, W.3
  • 30
    • 77958151362 scopus 로고    scopus 로고
    • Multi-use and unidirectional identity-based proxy re-encryption schemes
    • Wang H., Cao Z., Wang L. Multi-use and unidirectional identity-based proxy re-encryption schemes. Inf. Sci. 2010, 180(20):4042-4059.
    • (2010) Inf. Sci. , vol.180 , Issue.20 , pp. 4042-4059
    • Wang, H.1    Cao, Z.2    Wang, L.3
  • 31
    • 84855307392 scopus 로고    scopus 로고
    • Identity-based proxy cryptosystems with revocability and hierarchical confidentialities
    • Wang L., Wang L., Mambo M., Okamoto E. Identity-based proxy cryptosystems with revocability and hierarchical confidentialities. IEICE Trans. 2012, 95-A(1):70-88.
    • (2012) IEICE Trans. , Issue.1 , pp. 70-88
    • Wang, L.1    Wang, L.2    Mambo, M.3    Okamoto, E.4
  • 32
    • 78650288030 scopus 로고    scopus 로고
    • New identity-based proxy re-encryption schemes to prevent collusion attacks
    • M. Joye, A. Miyaji, A. Otsuka (Eds.)
    • Wang L., Wang L., Mambo M., Okamoto E. New identity-based proxy re-encryption schemes to prevent collusion attacks. Lect. Notes Comput. Sci. 2010, vol. 6487:327-346. M. Joye, A. Miyaji, A. Otsuka (Eds.).
    • (2010) Lect. Notes Comput. Sci. , vol.6487 , pp. 327-346
    • Wang, L.1    Wang, L.2    Mambo, M.3    Okamoto, E.4
  • 33
    • 24944566040 scopus 로고    scopus 로고
    • Efficient identity-based encryption without random oracles
    • Springer, R. Cramer (Ed.)
    • Waters B. Efficient identity-based encryption without random oracles. Lect. Notes Comput. Sci. 2005, vol. 3494:114-127. Springer. R. Cramer (Ed.).
    • (2005) Lect. Notes Comput. Sci. , vol.3494 , pp. 114-127
    • Waters, B.1
  • 34
    • 70350345210 scopus 로고    scopus 로고
    • Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions
    • Springer, S. Halevi (Ed.)
    • Waters B. Dual system encryption: realizing fully secure IBE and HIBE under simple assumptions. Lect. Notes Comput. Sci. 2009, vol. 5677:619-636. Springer. S. Halevi (Ed.).
    • (2009) Lect. Notes Comput. Sci. , vol.5677 , pp. 619-636
    • Waters, B.1
  • 35
    • 77952322019 scopus 로고    scopus 로고
    • CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
    • Weng J., Chen M., Yang Y., Deng R.H., Chen K., Bao F. CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles. Sci. China Inf. Sci. 2010, 53(3):593-606.
    • (2010) Sci. China Inf. Sci. , vol.53 , Issue.3 , pp. 593-606
    • Weng, J.1    Chen, M.2    Yang, Y.3    Deng, R.H.4    Chen, K.5    Bao, F.6
  • 36
    • 79952516416 scopus 로고    scopus 로고
    • On the security of a bidirectional proxy re-encryption scheme from PKC 2010
    • Springer, D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi (Eds.)
    • Weng J., Zhao Y., Hanaoka G. On the security of a bidirectional proxy re-encryption scheme from PKC 2010. Lect. Notes Comput. Sci. 2011, vol. 6571:284-295. Springer. D. Catalano, N. Fazio, R. Gennaro, A. Nicolosi (Eds.).
    • (2011) Lect. Notes Comput. Sci. , vol.6571 , pp. 284-295
    • Weng, J.1    Zhao, Y.2    Hanaoka, G.3
  • 37
    • 70350376239 scopus 로고    scopus 로고
    • Efficient conditional proxy re-encryption with chosen-ciphertext security
    • Springer, P. Samarati, M. Yung, F. Martinelli, C.A. Ardagna (Eds.)
    • Weng J., Yang Y., Tang Q., Deng R.H., Bao F. Efficient conditional proxy re-encryption with chosen-ciphertext security. Lect. Notes Comput. Sci. 2009, vol. 5735:151-166. Springer. P. Samarati, M. Yung, F. Martinelli, C.A. Ardagna (Eds.).
    • (2009) Lect. Notes Comput. Sci. , vol.5735 , pp. 151-166
    • Weng, J.1    Yang, Y.2    Tang, Q.3    Deng, R.H.4    Bao, F.5
  • 38
    • 77952320634 scopus 로고    scopus 로고
    • Conditional proxy re-encryption secure against chosen-ciphertext attack
    • ACM, W. Li, W. Susilo, U.K. Tupakula, R. Safavi-Naini, V. Varadharajan (Eds.)
    • Weng J., Deng R.H., Ding X., Chu C.-K., Lai J. Conditional proxy re-encryption secure against chosen-ciphertext attack. ASIACCS 2009, 322-332. ACM. W. Li, W. Susilo, U.K. Tupakula, R. Safavi-Naini, V. Varadharajan (Eds.).
    • (2009) ASIACCS , pp. 322-332
    • Weng, J.1    Deng, R.H.2    Ding, X.3    Chu, C.-K.4    Lai, J.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.