Cryptology ePrint Archive: Report 2010/112
CCA-Secure PRE Scheme without Random Oracles
Jun Shao and Zhenfu Cao and Peng Liu
Abstract: In a proxy re-encryption scheme, a semi-trusted proxy can transform
a ciphertext under Alice's public key into another ciphertext that
Bob can decrypt. However, the proxy cannot access the plaintext. Due
to its transformation property, proxy re-encryption can be used in
many applications, such as encrypted email forwarding. In this
paper, by using the techniques of Canetti-Hohenberger and
Kurosawa-Desmedt, we propose a new single-use unidirectional proxy
re-encryption scheme. Our proposal is secure against chosen
ciphertext attack (CCA) and collusion attack in the standard
model.
Category / Keywords: public-key cryptography / proxy re-encryption
Date: received 1 Mar 2010, last revised 1 Mar 2010
Contact author: chn junshao at gmail com
Available format(s): PDF | BibTeX Citation
Version: 20100304:141248 (All versions of this report)
Short URL: ia.cr/2010/112
Discussion forum: Show discussion | Start new discussion
[ Cryptology ePrint archive ]