International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Paper: CCA-Secure PRE Scheme without Random Oracles

Authors:
Jun Shao
Zhenfu Cao
Peng Liu
Download:
URL: http://eprint.iacr.org/2010/112
Search ePrint
Search Google
Abstract: In a proxy re-encryption scheme, a semi-trusted proxy can transform a ciphertext under Alice's public key into another ciphertext that Bob can decrypt. However, the proxy cannot access the plaintext. Due to its transformation property, proxy re-encryption can be used in many applications, such as encrypted email forwarding. In this paper, by using the techniques of Canetti-Hohenberger and Kurosawa-Desmedt, we propose a new single-use unidirectional proxy re-encryption scheme. Our proposal is secure against chosen ciphertext attack (CCA) and collusion attack in the standard model.
BibTeX
@misc{eprint-2010-23013,
  title={CCA-Secure PRE Scheme without Random Oracles},
  booktitle={IACR Eprint archive},
  keywords={public-key cryptography / proxy re-encryption},
  url={http://eprint.iacr.org/2010/112},
  note={ chn.junshao@gmail.com 14669 received 1 Mar 2010, last revised 1 Mar 2010},
  author={Jun Shao and Zhenfu Cao and Peng Liu},
  year=2010
}