EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY
In a proxy re-encryption (PRE) scheme, Alice gives a special information to a proxy that allows it to transform messages encrypted under Alice's public key into a encryption under Bob's public key such that the message is not revealed to the proxy. In [14], Jian Weng and others introduced...
Gespeichert in:
Veröffentlicht in: | International journal of network security & its applications 2012-03, Vol.4 (2), p.179-179 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 179 |
---|---|
container_issue | 2 |
container_start_page | 179 |
container_title | International journal of network security & its applications |
container_volume | 4 |
creator | Vivek, S Sree Selvi, S Sharmila Deva Radhakishan, V Rangan, C Pandu |
description | In a proxy re-encryption (PRE) scheme, Alice gives a special information to a proxy that allows it to transform messages encrypted under Alice's public key into a encryption under Bob's public key such that the message is not revealed to the proxy. In [14], Jian Weng and others introduced the notion of conditional proxy re-encryption (C-PRE) with bilinear pairings. Later, a break for the same was published in [17] and a new C-PRE scheme with bilinear pairings was introduced. In C-PRE, the proxy also needs to have the right condition key to transform the ciphertext (associated with a condition set by Alice) under Alice's public key into ciphertext under Bob's public key, so that Bob can decrypt it. In this paper, we propose an efficient C-PRE scheme which uses substantially less number of bilinear pairings when compared to the existing one [17]. We then prove its chosen-ciphertext security under modified Computational Diffie-Hellman (mCDH) and modified Computational Bilinear Diffie-Hellman (mCBDH) assumptions in the random oracle model. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_miscellaneous_1349444107</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>1349444107</sourcerecordid><originalsourceid>FETCH-proquest_miscellaneous_13494441073</originalsourceid><addsrcrecordid>eNqVitEKgjAYRkcUJOU77LIbYbqFeBnrlw1ik7lIr0RiQWFZLd8_i16g7-YcDt8EBSRLWZRRSqZfX0cJJekchd5fyDhGkrEGSEKeSy5BWcy12kortdrscGF0VWMDoLipi0_EB2kF5kKXoDCXhQCDLVQWl8D3Rtp6iWantvMu_HGBVjlYLqL7s38Mzr-a69kfXde1N9cPvokpyxhjMUnpH9c3-a07hA</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1349444107</pqid></control><display><type>article</type><title>EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY</title><source>Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals</source><creator>Vivek, S Sree ; Selvi, S Sharmila Deva ; Radhakishan, V ; Rangan, C Pandu</creator><creatorcontrib>Vivek, S Sree ; Selvi, S Sharmila Deva ; Radhakishan, V ; Rangan, C Pandu</creatorcontrib><description>In a proxy re-encryption (PRE) scheme, Alice gives a special information to a proxy that allows it to transform messages encrypted under Alice's public key into a encryption under Bob's public key such that the message is not revealed to the proxy. In [14], Jian Weng and others introduced the notion of conditional proxy re-encryption (C-PRE) with bilinear pairings. Later, a break for the same was published in [17] and a new C-PRE scheme with bilinear pairings was introduced. In C-PRE, the proxy also needs to have the right condition key to transform the ciphertext (associated with a condition set by Alice) under Alice's public key into ciphertext under Bob's public key, so that Bob can decrypt it. In this paper, we propose an efficient C-PRE scheme which uses substantially less number of bilinear pairings when compared to the existing one [17]. We then prove its chosen-ciphertext security under modified Computational Diffie-Hellman (mCDH) and modified Computational Bilinear Diffie-Hellman (mCBDH) assumptions in the random oracle model.</description><identifier>ISSN: 0975-2307</identifier><identifier>EISSN: 0974-9330</identifier><language>eng</language><subject>Computation ; Computer information security ; Messages ; Networks ; Proxy client servers ; Security ; Texts ; Transforms</subject><ispartof>International journal of network security & its applications, 2012-03, Vol.4 (2), p.179-179</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,780,784</link.rule.ids></links><search><creatorcontrib>Vivek, S Sree</creatorcontrib><creatorcontrib>Selvi, S Sharmila Deva</creatorcontrib><creatorcontrib>Radhakishan, V</creatorcontrib><creatorcontrib>Rangan, C Pandu</creatorcontrib><title>EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY</title><title>International journal of network security & its applications</title><description>In a proxy re-encryption (PRE) scheme, Alice gives a special information to a proxy that allows it to transform messages encrypted under Alice's public key into a encryption under Bob's public key such that the message is not revealed to the proxy. In [14], Jian Weng and others introduced the notion of conditional proxy re-encryption (C-PRE) with bilinear pairings. Later, a break for the same was published in [17] and a new C-PRE scheme with bilinear pairings was introduced. In C-PRE, the proxy also needs to have the right condition key to transform the ciphertext (associated with a condition set by Alice) under Alice's public key into ciphertext under Bob's public key, so that Bob can decrypt it. In this paper, we propose an efficient C-PRE scheme which uses substantially less number of bilinear pairings when compared to the existing one [17]. We then prove its chosen-ciphertext security under modified Computational Diffie-Hellman (mCDH) and modified Computational Bilinear Diffie-Hellman (mCBDH) assumptions in the random oracle model.</description><subject>Computation</subject><subject>Computer information security</subject><subject>Messages</subject><subject>Networks</subject><subject>Proxy client servers</subject><subject>Security</subject><subject>Texts</subject><subject>Transforms</subject><issn>0975-2307</issn><issn>0974-9330</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2012</creationdate><recordtype>article</recordtype><recordid>eNqVitEKgjAYRkcUJOU77LIbYbqFeBnrlw1ik7lIr0RiQWFZLd8_i16g7-YcDt8EBSRLWZRRSqZfX0cJJekchd5fyDhGkrEGSEKeSy5BWcy12kortdrscGF0VWMDoLipi0_EB2kF5kKXoDCXhQCDLVQWl8D3Rtp6iWantvMu_HGBVjlYLqL7s38Mzr-a69kfXde1N9cPvokpyxhjMUnpH9c3-a07hA</recordid><startdate>20120301</startdate><enddate>20120301</enddate><creator>Vivek, S Sree</creator><creator>Selvi, S Sharmila Deva</creator><creator>Radhakishan, V</creator><creator>Rangan, C Pandu</creator><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20120301</creationdate><title>EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY</title><author>Vivek, S Sree ; Selvi, S Sharmila Deva ; Radhakishan, V ; Rangan, C Pandu</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_miscellaneous_13494441073</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2012</creationdate><topic>Computation</topic><topic>Computer information security</topic><topic>Messages</topic><topic>Networks</topic><topic>Proxy client servers</topic><topic>Security</topic><topic>Texts</topic><topic>Transforms</topic><toplevel>online_resources</toplevel><creatorcontrib>Vivek, S Sree</creatorcontrib><creatorcontrib>Selvi, S Sharmila Deva</creatorcontrib><creatorcontrib>Radhakishan, V</creatorcontrib><creatorcontrib>Rangan, C Pandu</creatorcontrib><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>International journal of network security & its applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Vivek, S Sree</au><au>Selvi, S Sharmila Deva</au><au>Radhakishan, V</au><au>Rangan, C Pandu</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY</atitle><jtitle>International journal of network security & its applications</jtitle><date>2012-03-01</date><risdate>2012</risdate><volume>4</volume><issue>2</issue><spage>179</spage><epage>179</epage><pages>179-179</pages><issn>0975-2307</issn><eissn>0974-9330</eissn><abstract>In a proxy re-encryption (PRE) scheme, Alice gives a special information to a proxy that allows it to transform messages encrypted under Alice's public key into a encryption under Bob's public key such that the message is not revealed to the proxy. In [14], Jian Weng and others introduced the notion of conditional proxy re-encryption (C-PRE) with bilinear pairings. Later, a break for the same was published in [17] and a new C-PRE scheme with bilinear pairings was introduced. In C-PRE, the proxy also needs to have the right condition key to transform the ciphertext (associated with a condition set by Alice) under Alice's public key into ciphertext under Bob's public key, so that Bob can decrypt it. In this paper, we propose an efficient C-PRE scheme which uses substantially less number of bilinear pairings when compared to the existing one [17]. We then prove its chosen-ciphertext security under modified Computational Diffie-Hellman (mCDH) and modified Computational Bilinear Diffie-Hellman (mCBDH) assumptions in the random oracle model.</abstract></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0975-2307 |
ispartof | International journal of network security & its applications, 2012-03, Vol.4 (2), p.179-179 |
issn | 0975-2307 0974-9330 |
language | eng |
recordid | cdi_proquest_miscellaneous_1349444107 |
source | Elektronische Zeitschriftenbibliothek - Frei zugängliche E-Journals |
subjects | Computation Computer information security Messages Networks Proxy client servers Security Texts Transforms |
title | EFFICIENT CONDITIONAL PROXY REENCRYPTION WITH CHOSEN CIPHER TEXT SECURITY |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-12T11%3A05%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=EFFICIENT%20CONDITIONAL%20PROXY%20REENCRYPTION%20WITH%20CHOSEN%20CIPHER%20TEXT%20SECURITY&rft.jtitle=International%20journal%20of%20network%20security%20&%20its%20applications&rft.au=Vivek,%20S%20Sree&rft.date=2012-03-01&rft.volume=4&rft.issue=2&rft.spage=179&rft.epage=179&rft.pages=179-179&rft.issn=0975-2307&rft.eissn=0974-9330&rft_id=info:doi/&rft_dat=%3Cproquest%3E1349444107%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1349444107&rft_id=info:pmid/&rfr_iscdi=true |