A CCA-secure identity-based conditional proxy re-encryption without random oracles

Kaitai Liang, Zhen Liu, Xiao Tan, Duncan S. Wong, Chunming Tang

Research output: Chapters, Conference Papers, Creative and Literary WorksRGC 32 - Refereed conference paper (with host publication)peer-review

41 Citations (Scopus)

Abstract

Although a few unidirectional single-hop Identity-Based Proxy Re-Encryption (IBPRE) systems are available in the literature, none of them is CCA secure in the standard model. Besides, they can not support conditional re-encryption property, which allows a delegator to specify a condition for ciphertexts so that the proxy can re-encrypt ciphertexts only if the re-encryption key corresponding to the same condition is given. This paper, for the first time, proposes a new unidirectional single-hop Identity-Based Conditional Proxy Re-Encryption (IBCPRE) scheme that not only captures the property of IBPRE (i.e. identity-based re-encryption), but also supports conditional re-encryption. Moreover, the scheme can be proved secure against adaptive condition and adaptive identity chosen-ciphertext attacks in the standard model. © 2013 Springer-Verlag.
Original languageEnglish
Title of host publicationInformation Security and Cryptology, ICISC 2012
Subtitle of host publication15th International Conference, Revised Selected Papers
PublisherSpringer Verlag
Pages231-246
Volume7839 LNCS
ISBN (Print)9783642376818
DOIs
Publication statusPublished - Nov 2012
Event15th International Conference on Information Security and Cryptology, ICISC 2012 - Seoul, Korea, Republic of
Duration: 28 Nov 201230 Nov 2012

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7839 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference15th International Conference on Information Security and Cryptology, ICISC 2012
PlaceKorea, Republic of
CitySeoul
Period28/11/1230/11/12

Research Keywords

  • Identity-Based Encryption
  • Single Hop
  • Standard Model
  • Unidirectional Conditional Proxy Re-encryption

Fingerprint

Dive into the research topics of 'A CCA-secure identity-based conditional proxy re-encryption without random oracles'. Together they form a unique fingerprint.

Cite this