会议专题

Improved Proxy Re-encryption with Delegatable Verifiability

  In a proxy re-encryption scheme, the proxy can re-encrypt the ciphertext without exposing the corresponding plaintext.With this advantage, proxy re-encryption has been applied to many fields, including cloud computing, email forwarding, secure file systems and so on.In practice, proxy re-encryption supports verification of ciphertext to preserve the benefits of users.For verification, there are three kinds of verification method: public verification, private verification and delegatable verification.Delegatable verification is more powerful than others since it can be flexibly converted between public and private verification.However, almost existing schemes with delegatable verifiability only achieve replayable chosen ciphertext security.Hence, it remains an open problem to build a chosen ciphertext secure scheme which is more secure than existing schemes.In this paper,we utilize short signature scheme to prevent attacker to forge a valid ciphertext, and protect the public key of signature scheme to prevent attacker to forge a valid signature.As results, we present a more secure construction of proxy re-encryption scheme with delegatable verifiability.The security analyses show our scheme is chosen ciphertext secure in the standard model.

Proxy re-encryption delegatable verifiability chosen ciphertext security standard model

Yu Zhan Baocang Wang Yuan Chen

the State Key Laboratory of Integrated Service Networks Xidian University, Xian, China the School of Information Engineering, Xuchang University, Xuchang, China the State Key Laboratory o

国际会议

中国密码学会2018年密码算法学术会议

广州

英文

141-158

2018-05-01(万方平台首次上网日期,不代表论文的发表时间)