An efficient proxy re-encryption based on (Semi) group factorization problems

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

1 Citation (Scopus)

Abstract

Proxy re-encryption (PRE) enables a semi-trustedproxy to transfer Alice's secrets into Bob's secrets but withoutseeing the secrets. This functionality is very interesting formaking balance between the information confidentiality and themutual accessibility in various scenarios such as public cloudstorage systems. During the past decades, many smart PREschemes were built based on intractability assumptions suchas integer factorization problems (IFP) and discrete logarithmproblems (DLP). However, Shor's efficient quantum algorithmsfor IFP and DLP manifests a threat towards the securitybaseline of these schemes. Enlightened by Gu et al.'s recent workon resisting known quantum attacks, we propose an efficientPRE scheme based on the intractability of the (semi) groupfactorization problems in this paper. The security of the proposedscheme is analyzed according to some conceivable attacks.

Original languageEnglish
Title of host publicationProceedings - 2016 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2016
EditorsFatos Xhafa, Ivan Zelinka, Leonard Barolli, Vaclav Snasel
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages199-202
Number of pages4
ISBN (Electronic)9781509041237
DOIs
Publication statusPublished - 25 Oct 2016
Externally publishedYes
Event8th International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2016 - Ostrava, Czech Republic
Duration: 7 Sept 20169 Sept 2016

Publication series

NameProceedings - 2016 International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2016

Conference

Conference8th International Conference on Intelligent Networking and Collaborative Systems, IEEE INCoS 2016
Country/TerritoryCzech Republic
CityOstrava
Period7/09/169/09/16

Fingerprint

Dive into the research topics of 'An efficient proxy re-encryption based on (Semi) group factorization problems'. Together they form a unique fingerprint.

Cite this