DC Field | Value | Language |
---|---|---|
dc.contributor.author | Seo, JW | - |
dc.contributor.author | Yum, DH | - |
dc.contributor.author | Lee, PJ | - |
dc.date.accessioned | 2016-03-31T08:12:11Z | - |
dc.date.available | 2016-03-31T08:12:11Z | - |
dc.date.created | 2014-03-07 | - |
dc.date.issued | 2013-06-17 | - |
dc.identifier.issn | 0304-3975 | - |
dc.identifier.other | 2013-OAK-0000029310 | - |
dc.identifier.uri | https://oasis.postech.ac.kr/handle/2014.oak/14787 | - |
dc.description.abstract | In a proxy re-encryption (PRE) scheme, a delegator gives a re-encryption key to a semi-trusted proxy who, by using the re-encryption key, can transform a ciphertext encrypted under the delegator's public key into one that can be decrypted using a private key of another user (called a delegatee). To provide fine-grained delegation, type-based PRE (TB-PRE) was introduced in which the decryption right can be selectively delegated. The proxy in TB-PRE can only re-encrypt ciphertexts with a specific type selected by the delegator. Tang proposed the first proxy-invisible TB-PRE scheme where proxy invisibility means that an adversary cannot distinguish between original ciphertexts and re-encrypted ciphertexts. However, Tang's scheme is only secure against chosen-plaintext attacks. Jia et al. proposed a proxy-invisible TB-PRE scheme that is secure against chosen-ciphertext attacks with random oracle heuristic. To date, there is no TB-PRE scheme achieving both proxy invisibility and chosen-ciphertext security in the standard model (i.e., without random oracles). We propose the first proxy-invisible TB-PRE scheme that is secure against chosen-ciphertext attacks in the standard model. (C) 2012 Elsevier B.V. All rights reserved. | - |
dc.description.statementofresponsibility | X | - |
dc.language | English | - |
dc.publisher | ELSEVIER SCIENCE BV | - |
dc.relation.isPartOf | THEORETICAL COMPUTER SCIENCE | - |
dc.subject | Public key encryption | - |
dc.subject | Type-based proxy re-encryption | - |
dc.subject | Proxy invisibility | - |
dc.subject | Chosen-ciphertext security | - |
dc.subject | CHOSEN-CIPHERTEXT SECURITY | - |
dc.subject | IDENTITY-BASED ENCRYPTION | - |
dc.subject | SCHEME | - |
dc.title | Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles | - |
dc.type | Article | - |
dc.contributor.college | 전자전기공학과 | - |
dc.identifier.doi | 10.1016/J.TCS.2012.11.026 | - |
dc.author.google | Seo, JW | - |
dc.author.google | Yum, DH | - |
dc.author.google | Lee, PJ | - |
dc.relation.volume | 491 | - |
dc.relation.startpage | 83 | - |
dc.relation.lastpage | 93 | - |
dc.contributor.id | 10051689 | - |
dc.relation.journal | THEORETICAL COMPUTER SCIENCE | - |
dc.relation.index | SCI급, SCOPUS 등재논문 | - |
dc.relation.sci | SCIE | - |
dc.collections.name | Journal Papers | - |
dc.type.rims | ART | - |
dc.identifier.bibliographicCitation | THEORETICAL COMPUTER SCIENCE, v.491, pp.83 - 93 | - |
dc.identifier.wosid | 000321176800006 | - |
dc.date.tcdate | 2019-01-01 | - |
dc.citation.endPage | 93 | - |
dc.citation.startPage | 83 | - |
dc.citation.title | THEORETICAL COMPUTER SCIENCE | - |
dc.citation.volume | 491 | - |
dc.contributor.affiliatedAuthor | Lee, PJ | - |
dc.identifier.scopusid | 2-s2.0-84878740688 | - |
dc.description.journalClass | 1 | - |
dc.description.journalClass | 1 | - |
dc.description.wostc | 6 | - |
dc.description.scptc | 9 | * |
dc.date.scptcdate | 2018-05-121 | * |
dc.type.docType | Article | - |
dc.subject.keywordAuthor | Public key encryption | - |
dc.subject.keywordAuthor | Type-based proxy re-encryption | - |
dc.subject.keywordAuthor | Proxy invisibility | - |
dc.subject.keywordAuthor | Chosen-ciphertext security | - |
dc.relation.journalWebOfScienceCategory | Computer Science, Theory & Methods | - |
dc.description.journalRegisteredClass | scie | - |
dc.description.journalRegisteredClass | scopus | - |
dc.relation.journalResearchArea | Computer Science | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
library@postech.ac.kr Tel: 054-279-2548
Copyrights © by 2017 Pohang University of Science ad Technology All right reserved.