Analysis of One Proxy Re-Encryption Scheme

Article Preview

Abstract:

Unlike some earlier proxy re-encryption schemes, the LV08 scheme specifies a validity-checking process to guarantee that the received ciphertext is well-formed. In this paper, we clarify that the received message is well-formed is the premise to decryption in all encryption schemes. The underlying mechanism to keep the communicated message well-formed in encryption schemes is another topic. We will simplify the LV08 scheme and show its security level is the same as that of the AFGH05 scheme.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

284-288

Citation:

Online since:

October 2011

Export:

Price:

[1] G. Ateniese, K. Fu, M. Green, S. Hohenberger, Improved proxy re-encryption schemes with applications to secure distributed storage. NDSS'05, The Internet Society, 29-43 (2005).

DOI: 10.1145/1127345.1127346

Google Scholar

[2] M. Blaze, G. Bleumer, M. Strauss. Divertible protocols and atomic proxy cryptography. EUROCRYPT'98. LNCS, vol. 1403, 127-144, Springer (1998).

DOI: 10.1007/bfb0054122

Google Scholar

[3] D. Boneh, M. Franklin. Identity-based encryption from the Weil Pairing. SIAM Journal of Computing, 32 (3): 586-615 (2003).

DOI: 10.1137/s0097539701398521

Google Scholar

[4] R. Canetti, S. Hohenberger, Chosen-ciphertext secure proxy re-encryption. ACM Conference on Computer and Communications Security, 185-194, ACM (2007).

DOI: 10.1145/1315245.1315269

Google Scholar

[5] R. Cramer, V. Shoup. A Practical Public Key Cryptosystem Provably Secure against Adaptive Chosen Ciphertext Attack, CRYPTO'98, LNCS, vol. 1462, 13-25. Springer (1998).

DOI: 10.1007/bfb0055717

Google Scholar

[6] T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms, CRYPTO'84, LNCS, vol. 196, 10-18. Springer (1984).

DOI: 10.1007/3-540-39568-7_2

Google Scholar

[7] B. Libert, D. Vergnaud, Unidirectional chosen-ciphertext secure proxy re-encryption. PKC 2008. LNCS, vol 4939, 360-379, Springer (2008).

DOI: 10.1007/978-3-540-78440-1_21

Google Scholar

[8] A. Menezes, P. Oorschot and S. Vanstone, Handbook of applied cryptography, CRC Press (1996).

Google Scholar