File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1016/j.tcs.2020.09.031
- Scopus: eid_2-s2.0-85091226386
- WOS: WOS:000588118200001
- Find via

Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Constant-Size CCA-Secure Multi-Hop Unidirectional Proxy Re-encryption From Indistinguishability Obfuscation
| Title | Constant-Size CCA-Secure Multi-Hop Unidirectional Proxy Re-encryption From Indistinguishability Obfuscation |
|---|---|
| Authors | |
| Keywords | Chosen-Ciphertext attack Indistinguishability obfuscation Multi-hop Unidirectional proxy re-encryption |
| Issue Date | 2020 |
| Publisher | Elsevier BV. The Journal's web site is located at http://www.elsevier.com/locate/tcs |
| Citation | Theoretical Computer Science, v. 847, p. 1-16 How to Cite? |
| Abstract | In ACM CCS 2007, Canetti and Hohenberger left an open problem of how to construct a multi-hop unidirectional proxy re-encryption scheme secure against chosen-ciphertext attacks (CCA). To resolve this problem, we utilize the recent advances in indistinguishability obfuscation, overcome several obstacles and propose a multi-hop unidirectional proxy re-encryption scheme. The proposed scheme is proved to be CCA-secure in the standard model (i.e., without using the random oracle heuristic), and its ciphertext remains constant-size regardless of how many times it has been transformed. It is worth noting that, our techniques proposed in this paper can also be used to construct an identity-based multi-hop unidirectional PRE scheme with constant-size ciphertexts and CCA-security in the standard model. © 2020 Elsevier B.V. |
| Description | This paper constitutes an extended full version of a paper [28] published in the 23rd Australasian Conference on Information Security and Privacy
(ACISP 2018). The journal version contains additional explanations and full proofs |
| Persistent Identifier | http://hdl.handle.net/10722/305496 |
| ISSN | 2023 Impact Factor: 0.9 2023 SCImago Journal Rankings: 0.570 |
| ISI Accession Number ID |
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Lai, J | - |
| dc.contributor.author | Huang, Z | - |
| dc.contributor.author | Au, AMH | - |
| dc.contributor.author | Mao, X | - |
| dc.date.accessioned | 2021-10-20T10:10:13Z | - |
| dc.date.available | 2021-10-20T10:10:13Z | - |
| dc.date.issued | 2020 | - |
| dc.identifier.citation | Theoretical Computer Science, v. 847, p. 1-16 | - |
| dc.identifier.issn | 0304-3975 | - |
| dc.identifier.uri | http://hdl.handle.net/10722/305496 | - |
| dc.description | This paper constitutes an extended full version of a paper [28] published in the 23rd Australasian Conference on Information Security and Privacy (ACISP 2018). The journal version contains additional explanations and full proofs | - |
| dc.description.abstract | In ACM CCS 2007, Canetti and Hohenberger left an open problem of how to construct a multi-hop unidirectional proxy re-encryption scheme secure against chosen-ciphertext attacks (CCA). To resolve this problem, we utilize the recent advances in indistinguishability obfuscation, overcome several obstacles and propose a multi-hop unidirectional proxy re-encryption scheme. The proposed scheme is proved to be CCA-secure in the standard model (i.e., without using the random oracle heuristic), and its ciphertext remains constant-size regardless of how many times it has been transformed. It is worth noting that, our techniques proposed in this paper can also be used to construct an identity-based multi-hop unidirectional PRE scheme with constant-size ciphertexts and CCA-security in the standard model. © 2020 Elsevier B.V. | - |
| dc.language | eng | - |
| dc.publisher | Elsevier BV. The Journal's web site is located at http://www.elsevier.com/locate/tcs | - |
| dc.relation.ispartof | Theoretical Computer Science | - |
| dc.subject | Chosen-Ciphertext attack | - |
| dc.subject | Indistinguishability obfuscation | - |
| dc.subject | Multi-hop | - |
| dc.subject | Unidirectional proxy re-encryption | - |
| dc.title | Constant-Size CCA-Secure Multi-Hop Unidirectional Proxy Re-encryption From Indistinguishability Obfuscation | - |
| dc.type | Conference_Paper | - |
| dc.identifier.email | Au, AMH: manhoau@hku.hk | - |
| dc.identifier.authority | Au, AMH=rp02638 | - |
| dc.description.nature | link_to_subscribed_fulltext | - |
| dc.identifier.doi | 10.1016/j.tcs.2020.09.031 | - |
| dc.identifier.scopus | eid_2-s2.0-85091226386 | - |
| dc.identifier.hkuros | 327811 | - |
| dc.identifier.volume | 847 | - |
| dc.identifier.spage | 1 | - |
| dc.identifier.epage | 16 | - |
| dc.identifier.isi | WOS:000588118200001 | - |
| dc.publisher.place | Netherlands | - |
