CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles  被引量:12

CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles

在线阅读下载全文

作  者:WENG Jian CHEN MinRong ANG YanJiang DENG Robert CHEN KeFei BAO Feng 

机构地区:[1]Department of Computer Science, Jinan University, Guangzhou 510632, China [2]School of Information Systems, Singapore Management University, Singapore 178902 [3]College of Information Engineering, Shenzhen University, Shenzhen 518060, China [4]Institute for Infocomm Research (I2R), Singapore 119613 [5]Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240, China

出  处:《Science China(Information Sciences)》2010年第3期593-606,共14页中国科学(信息科学)(英文版)

基  金:supported by the Office of Research, Singapore Management University;supported by the National Natural Science Foundation of China (Grant Nos. 60903178,90704004,60703030,60873229);the National High-Tech Research & Development Program of China (Grants Nos.2009AA01Z418,2008AA01Z403,2007AA01Z456)

摘  要:Up to now, it is still an open question of how to construct a chosen-ciphertext secure unidirectional proxy re-encryption scheme in the adaptive corruption model. To address this problem, we propose a new unidirectional proxy re-encryption scheme, and prove its chosen-ciphertext security in the adaptive corruption model without random oracles. Compared with the best known unidirectional proxy re-encryption scheme proposed by Libert and Vergnaud in PKC'08, our scheme enjoys the advantages of both higher efficiency and stronger security.Up to now, it is still an open question of how to construct a chosen-ciphertext secure unidirectional proxy re-encryption scheme in the adaptive corruption model. To address this problem, we propose a new unidirectional proxy re-encryption scheme, and prove its chosen-ciphertext security in the adaptive corruption model without random oracles. Compared with the best known unidirectional proxy re-encryption scheme proposed by Libert and Vergnaud in PKC'08, our scheme enjoys the advantages of both higher efficiency and stronger security.

关 键 词:unidirectional proxy re-encryption adaptive corruption model chosen-ciphertext attack 

分 类 号:TP309[自动化与计算机技术—计算机系统结构] TP393.08[自动化与计算机技术—计算机科学与技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象