File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1016/j.tcs.2020.09.031
- Scopus: eid_2-s2.0-85091226386
- WOS: WOS:000588118200001
- Find via
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Constant-Size CCA-Secure Multi-Hop Unidirectional Proxy Re-encryption From Indistinguishability Obfuscation
Title | Constant-Size CCA-Secure Multi-Hop Unidirectional Proxy Re-encryption From Indistinguishability Obfuscation |
---|---|
Authors | |
Keywords | Chosen-Ciphertext attack Indistinguishability obfuscation Multi-hop Unidirectional proxy re-encryption |
Issue Date | 2020 |
Publisher | Elsevier BV. The Journal's web site is located at http://www.elsevier.com/locate/tcs |
Citation | Theoretical Computer Science, v. 847, p. 1-16 How to Cite? |
Abstract | In ACM CCS 2007, Canetti and Hohenberger left an open problem of how to construct a multi-hop unidirectional proxy re-encryption scheme secure against chosen-ciphertext attacks (CCA). To resolve this problem, we utilize the recent advances in indistinguishability obfuscation, overcome several obstacles and propose a multi-hop unidirectional proxy re-encryption scheme. The proposed scheme is proved to be CCA-secure in the standard model (i.e., without using the random oracle heuristic), and its ciphertext remains constant-size regardless of how many times it has been transformed. It is worth noting that, our techniques proposed in this paper can also be used to construct an identity-based multi-hop unidirectional PRE scheme with constant-size ciphertexts and CCA-security in the standard model. © 2020 Elsevier B.V. |
Description | This paper constitutes an extended full version of a paper [28] published in the 23rd Australasian Conference on Information Security and Privacy
(ACISP 2018). The journal version contains additional explanations and full proofs |
Persistent Identifier | http://hdl.handle.net/10722/305496 |
ISSN | 2023 Impact Factor: 0.9 2023 SCImago Journal Rankings: 0.570 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lai, J | - |
dc.contributor.author | Huang, Z | - |
dc.contributor.author | Au, AMH | - |
dc.contributor.author | Mao, X | - |
dc.date.accessioned | 2021-10-20T10:10:13Z | - |
dc.date.available | 2021-10-20T10:10:13Z | - |
dc.date.issued | 2020 | - |
dc.identifier.citation | Theoretical Computer Science, v. 847, p. 1-16 | - |
dc.identifier.issn | 0304-3975 | - |
dc.identifier.uri | http://hdl.handle.net/10722/305496 | - |
dc.description | This paper constitutes an extended full version of a paper [28] published in the 23rd Australasian Conference on Information Security and Privacy (ACISP 2018). The journal version contains additional explanations and full proofs | - |
dc.description.abstract | In ACM CCS 2007, Canetti and Hohenberger left an open problem of how to construct a multi-hop unidirectional proxy re-encryption scheme secure against chosen-ciphertext attacks (CCA). To resolve this problem, we utilize the recent advances in indistinguishability obfuscation, overcome several obstacles and propose a multi-hop unidirectional proxy re-encryption scheme. The proposed scheme is proved to be CCA-secure in the standard model (i.e., without using the random oracle heuristic), and its ciphertext remains constant-size regardless of how many times it has been transformed. It is worth noting that, our techniques proposed in this paper can also be used to construct an identity-based multi-hop unidirectional PRE scheme with constant-size ciphertexts and CCA-security in the standard model. © 2020 Elsevier B.V. | - |
dc.language | eng | - |
dc.publisher | Elsevier BV. The Journal's web site is located at http://www.elsevier.com/locate/tcs | - |
dc.relation.ispartof | Theoretical Computer Science | - |
dc.subject | Chosen-Ciphertext attack | - |
dc.subject | Indistinguishability obfuscation | - |
dc.subject | Multi-hop | - |
dc.subject | Unidirectional proxy re-encryption | - |
dc.title | Constant-Size CCA-Secure Multi-Hop Unidirectional Proxy Re-encryption From Indistinguishability Obfuscation | - |
dc.type | Conference_Paper | - |
dc.identifier.email | Au, AMH: manhoau@hku.hk | - |
dc.identifier.authority | Au, AMH=rp02638 | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1016/j.tcs.2020.09.031 | - |
dc.identifier.scopus | eid_2-s2.0-85091226386 | - |
dc.identifier.hkuros | 327811 | - |
dc.identifier.volume | 847 | - |
dc.identifier.spage | 1 | - |
dc.identifier.epage | 16 | - |
dc.identifier.isi | WOS:000588118200001 | - |
dc.publisher.place | Netherlands | - |