TY - GEN
T1 - New identity-based proxy re-encryption schemes to prevent collusion attacks
AU - Wang, Lihua
AU - Wang, Licheng
AU - Mambo, Masahiro
AU - Okamoto, Eiji
PY - 2010
Y1 - 2010
N2 - In this paper, we propose two new constructions of identity-based proxy re-encryption (IB-PRE). The most important feature of our schemes is that we no longer need the semi-trust assumption on the proxy. Moreover, we describe the IND-PrID-CCA/CPA security models for an IB-PRE in a single-hop scenario, and then give a general analysis on the relationship between the IND-PrID-CPA security model and the desirable PRE properties: unidirectionality, collusion "safeness" and non-transitivity. Our first scheme has no ciphertext expansion through the re-encryption and is proven IND-PrID-CPA secure in the random oracle model. The second one achieves the IND-PrID-CCA security.
AB - In this paper, we propose two new constructions of identity-based proxy re-encryption (IB-PRE). The most important feature of our schemes is that we no longer need the semi-trust assumption on the proxy. Moreover, we describe the IND-PrID-CCA/CPA security models for an IB-PRE in a single-hop scenario, and then give a general analysis on the relationship between the IND-PrID-CPA security model and the desirable PRE properties: unidirectionality, collusion "safeness" and non-transitivity. Our first scheme has no ciphertext expansion through the re-encryption and is proven IND-PrID-CPA secure in the random oracle model. The second one achieves the IND-PrID-CCA security.
UR - https://www.scopus.com/pages/publications/78650288030
U2 - 10.1007/978-3-642-17455-1_21
DO - 10.1007/978-3-642-17455-1_21
M3 - Conference contribution
AN - SCOPUS:78650288030
SN - 364217454X
SN - 9783642174544
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 327
EP - 346
BT - Pairing-Based Cryptography, Pairing 2010 - 4th International Conference, Proceedings
T2 - 4th International Conference on Pairing-Based Cryptography, Pairing 2010
Y2 - 13 December 2010 through 15 December 2010
ER -