Computer and Modernization ›› 2012, Vol. 1 ›› Issue (11): 134-141.doi: 10.3969/j.issn.1006-2475.2012.11.034

• 信息安全 • Previous Articles     Next Articles

Key Private Conditional Proxy Re-encryption in Standard Model

REN Yong-jun1,2, XU Xin-wei3, FANG Le3   

  1. 1. Jiangsu Engineering Center of Network Monitoring, Nanjing University of Information Science & Technology, Nanjing 210044, China;2. School of Computer & Software, Nanjing University of Information Science & Technology, Nanjing 210044, China;3. School of Management Science and Engineering, Anhui University of Technology, Ma’anshan 243002, China
  • Received:2012-06-11 Revised:1900-01-01 Online:2012-11-10 Published:2012-11-10
  • Contact: XU Xin-wei

Abstract: In proxy re-encryption, a proxy can transform the ciphertext under the delegator’s public key into another ciphertext that the delegatee can decrypt by its own private key. However, the proxy cannot access the plaintext. Due to its transformation property, proxy re-encryption can be used in many encrypted communication applications, such as encrypted email forwarding. However none of the existing conditional proxy re-encryption schemes satisfies key private. Based on the decision bilinear Diffie–Hellman assumption and the truncated q-ABDHE assumption, this paper proposes the first such CCA security conditional proxy re-encryption in the standard model.

Key words: conditional proxy re-encryption, key private, standard model

CLC Number: