[Resource Topic] 2010/112: CCA-Secure PRE Scheme without Random Oracles

Welcome to the resource topic for 2010/112

Title:
CCA-Secure PRE Scheme without Random Oracles

Authors: Jun Shao, Zhenfu Cao, Peng Liu

Abstract:

In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under Alice’s public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plaintext. Due to its transformation property, proxy re-encryption can be used in many applications, such as encrypted email forwarding. In this paper, by using the techniques of Canetti-Hohenberger and Kurosawa-Desmedt, we propose a new single-use unidirectional proxy re-encryption scheme. Our proposal is secure against chosen ciphertext attack (CCA) and collusion attack in the standard model.

ePrint: https://eprint.iacr.org/2010/112

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .