TY - GEN
T1 - A CCA-secure identity-based conditional proxy re-encryption without random oracles
AU - Liang, Kaitai
AU - Liu, Zhen
AU - Tan, Xiao
AU - Wong, Duncan S.
AU - Tang, Chunming
PY - 2012/11
Y1 - 2012/11
N2 - Although a few unidirectional single-hop Identity-Based Proxy Re-Encryption (IBPRE) systems are available in the literature, none of them is CCA secure in the standard model. Besides, they can not support conditional re-encryption property, which allows a delegator to specify a condition for ciphertexts so that the proxy can re-encrypt ciphertexts only if the re-encryption key corresponding to the same condition is given. This paper, for the first time, proposes a new unidirectional single-hop Identity-Based Conditional Proxy Re-Encryption (IBCPRE) scheme that not only captures the property of IBPRE (i.e. identity-based re-encryption), but also supports conditional re-encryption. Moreover, the scheme can be proved secure against adaptive condition and adaptive identity chosen-ciphertext attacks in the standard model. © 2013 Springer-Verlag.
AB - Although a few unidirectional single-hop Identity-Based Proxy Re-Encryption (IBPRE) systems are available in the literature, none of them is CCA secure in the standard model. Besides, they can not support conditional re-encryption property, which allows a delegator to specify a condition for ciphertexts so that the proxy can re-encrypt ciphertexts only if the re-encryption key corresponding to the same condition is given. This paper, for the first time, proposes a new unidirectional single-hop Identity-Based Conditional Proxy Re-Encryption (IBCPRE) scheme that not only captures the property of IBPRE (i.e. identity-based re-encryption), but also supports conditional re-encryption. Moreover, the scheme can be proved secure against adaptive condition and adaptive identity chosen-ciphertext attacks in the standard model. © 2013 Springer-Verlag.
KW - Identity-Based Encryption
KW - Single Hop
KW - Standard Model
KW - Unidirectional Conditional Proxy Re-encryption
UR - http://www.scopus.com/inward/record.url?scp=84875985547&partnerID=8YFLogxK
UR - https://www.scopus.com/record/pubmetrics.uri?eid=2-s2.0-84875985547&origin=recordpage
U2 - 10.1007/978-3-642-37682-5_17
DO - 10.1007/978-3-642-37682-5_17
M3 - RGC 32 - Refereed conference paper (with host publication)
SN - 9783642376818
VL - 7839 LNCS
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 231
EP - 246
BT - Information Security and Cryptology, ICISC 2012
PB - Springer Verlag
T2 - 15th International Conference on Information Security and Cryptology, ICISC 2012
Y2 - 28 November 2012 through 30 November 2012
ER -