File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation

TitleConstant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
Authors
KeywordsUnidirectional proxy re-encryption
Chosen-ciphertext attack
Indistinguishability obfuscation
Multi-hop
Issue Date2018
Citation
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, v. 10946 LNCS, p. 805-812 How to Cite?
Abstract© Springer International Publishing AG, part of Springer Nature 2018. In this paper, we utilize the recent advances in indistinguishability obfuscation, overcome several obstacles and propose a multi-hop unidirectional proxy re-encryption scheme. The proposed scheme is proved to be CCA-secure in the standard model (i.e., without using the random oracle heuristic), and its ciphertext remains constant-size regardless of how many times it has been transformed.
DescriptionThe 23rd Australasian Conference on Information Security and Privacy ( ACISP 2018), Wollongong, NSW, Australia, 11-13 July 2018, Proceedings
Persistent Identifierhttp://hdl.handle.net/10722/280760
ISSN
2023 SCImago Journal Rankings: 0.606
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorLai, Junzuo-
dc.contributor.authorHuang, Zhengan-
dc.contributor.authorAu, Man Ho-
dc.contributor.authorMao, Xianping-
dc.date.accessioned2020-02-17T14:34:52Z-
dc.date.available2020-02-17T14:34:52Z-
dc.date.issued2018-
dc.identifier.citationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, v. 10946 LNCS, p. 805-812-
dc.identifier.issn0302-9743-
dc.identifier.urihttp://hdl.handle.net/10722/280760-
dc.descriptionThe 23rd Australasian Conference on Information Security and Privacy ( ACISP 2018), Wollongong, NSW, Australia, 11-13 July 2018, Proceedings-
dc.description.abstract© Springer International Publishing AG, part of Springer Nature 2018. In this paper, we utilize the recent advances in indistinguishability obfuscation, overcome several obstacles and propose a multi-hop unidirectional proxy re-encryption scheme. The proposed scheme is proved to be CCA-secure in the standard model (i.e., without using the random oracle heuristic), and its ciphertext remains constant-size regardless of how many times it has been transformed.-
dc.languageeng-
dc.relation.ispartofLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)-
dc.relation.ispartofThe 23rd Australasian Conference on Information Security and Privacy ( ACISP 2018)-
dc.subjectUnidirectional proxy re-encryption-
dc.subjectChosen-ciphertext attack-
dc.subjectIndistinguishability obfuscation-
dc.subjectMulti-hop-
dc.titleConstant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation-
dc.typeConference_Paper-
dc.description.naturelink_to_subscribed_fulltext-
dc.identifier.doi10.1007/978-3-319-93638-3_49-
dc.identifier.scopuseid_2-s2.0-85049771774-
dc.identifier.volume10946 LNCS-
dc.identifier.spage805-
dc.identifier.epage812-
dc.identifier.eissn1611-3349-
dc.identifier.isiWOS:000546267700049-
dc.identifier.issnl0302-9743-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats