File Download
There are no files associated with this item.
Links for fulltext
(May Require Subscription)
- Publisher Website: 10.1007/978-3-319-93638-3_49
- Scopus: eid_2-s2.0-85049771774
- WOS: WOS:000546267700049
- Find via
Supplementary
- Citations:
- Appears in Collections:
Conference Paper: Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation
Title | Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation |
---|---|
Authors | |
Keywords | Unidirectional proxy re-encryption Chosen-ciphertext attack Indistinguishability obfuscation Multi-hop |
Issue Date | 2018 |
Citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, v. 10946 LNCS, p. 805-812 How to Cite? |
Abstract | © Springer International Publishing AG, part of Springer Nature 2018. In this paper, we utilize the recent advances in indistinguishability obfuscation, overcome several obstacles and propose a multi-hop unidirectional proxy re-encryption scheme. The proposed scheme is proved to be CCA-secure in the standard model (i.e., without using the random oracle heuristic), and its ciphertext remains constant-size regardless of how many times it has been transformed. |
Description | The 23rd Australasian Conference on Information Security and Privacy ( ACISP 2018), Wollongong, NSW, Australia, 11-13 July 2018, Proceedings |
Persistent Identifier | http://hdl.handle.net/10722/280760 |
ISSN | 2023 SCImago Journal Rankings: 0.606 |
ISI Accession Number ID |
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Lai, Junzuo | - |
dc.contributor.author | Huang, Zhengan | - |
dc.contributor.author | Au, Man Ho | - |
dc.contributor.author | Mao, Xianping | - |
dc.date.accessioned | 2020-02-17T14:34:52Z | - |
dc.date.available | 2020-02-17T14:34:52Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 2018, v. 10946 LNCS, p. 805-812 | - |
dc.identifier.issn | 0302-9743 | - |
dc.identifier.uri | http://hdl.handle.net/10722/280760 | - |
dc.description | The 23rd Australasian Conference on Information Security and Privacy ( ACISP 2018), Wollongong, NSW, Australia, 11-13 July 2018, Proceedings | - |
dc.description.abstract | © Springer International Publishing AG, part of Springer Nature 2018. In this paper, we utilize the recent advances in indistinguishability obfuscation, overcome several obstacles and propose a multi-hop unidirectional proxy re-encryption scheme. The proposed scheme is proved to be CCA-secure in the standard model (i.e., without using the random oracle heuristic), and its ciphertext remains constant-size regardless of how many times it has been transformed. | - |
dc.language | eng | - |
dc.relation.ispartof | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | - |
dc.relation.ispartof | The 23rd Australasian Conference on Information Security and Privacy ( ACISP 2018) | - |
dc.subject | Unidirectional proxy re-encryption | - |
dc.subject | Chosen-ciphertext attack | - |
dc.subject | Indistinguishability obfuscation | - |
dc.subject | Multi-hop | - |
dc.title | Constant-size CCA-secure multi-hop unidirectional proxy re-encryption from indistinguishability obfuscation | - |
dc.type | Conference_Paper | - |
dc.description.nature | link_to_subscribed_fulltext | - |
dc.identifier.doi | 10.1007/978-3-319-93638-3_49 | - |
dc.identifier.scopus | eid_2-s2.0-85049771774 | - |
dc.identifier.volume | 10946 LNCS | - |
dc.identifier.spage | 805 | - |
dc.identifier.epage | 812 | - |
dc.identifier.eissn | 1611-3349 | - |
dc.identifier.isi | WOS:000546267700049 | - |
dc.identifier.issnl | 0302-9743 | - |