Paper 2024/1977
Bounded CCA2 Secure Proxy Re-encryption Based on Kyber
Abstract
Proxy re-encryption (PRE) allows a semi-honest party (called a proxy) to convert ciphertexts under a public key into ciphertexts under another public key. Due to this functionality, there are various applications such as encrypted email forwarding, key escrow, and secure distributed file systems. On the other hand, post-quantum cryptography (PQC) is one of the most important research areas. However, there is no post-quantum PRE scheme with security against adaptive chosen ciphertext attacks (denoted by
Metadata
- Available format(s)
-
PDF
- Category
- Public-key cryptography
- Publication info
- Preprint.
- Keywords
- Proxy re-encryptionLattice-based cryptographyPost-quantum cryptography
- Contact author(s)
-
sato-shingo-zk @ ynu ac jp
shikata-junji-rb @ ynu ac jp - History
- 2025-02-22: last of 3 revisions
- 2024-12-06: received
- See all versions
- Short URL
- https://ia.cr/2024/1977
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2024/1977, author = {Shingo Sato and Junji Shikata}, title = {Bounded {CCA2} Secure Proxy Re-encryption Based on Kyber}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1977}, year = {2024}, url = {https://eprint.iacr.org/2024/1977} }