Paper Title:
Analysis of One Proxy Re-Encryption Scheme
  Abstract

Unlike some earlier proxy re-encryption schemes, the LV08 scheme specifies a validity-checking process to guarantee that the received ciphertext is well-formed. In this paper, we clarify that the received message is well-formed is the premise to decryption in all encryption schemes. The underlying mechanism to keep the communicated message well-formed in encryption schemes is another topic. We will simplify the LV08 scheme and show its security level is the same as that of the AFGH05 scheme.

  Info
Periodical
Chapter
Chapter 3: Advanced Intelligence & Manufacturing
Edited by
Robin G. Qiu and Yongfeng Ju
Pages
284-288
DOI
10.4028/www.scientific.net/AMM.135-136.284
Citation
L. H. Liu, Z. J. Cao, "Analysis of One Proxy Re-Encryption Scheme", Applied Mechanics and Materials, Vols. 135-136, pp. 284-288, 2012
Online since
October 2011
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

  | Authors: Xiu Ying Yu, Da Ke He
Chapter 3: Computational Methods for Engineering
Abstract:Multi-signcryption can meet the requirement of message signcryption with muti-participant. Since the existing identity-based...
198
Authors: Hui Meng, Xu Qian
Chapter 2: Network & Control
Abstract:Proxy multi-signature is an extension of the basic proxy signature primitive, and permits two or more entities to delegate their signing...
217
Authors: Shao Ping Yin
Abstract:In order to reap the benefits promised by the Smart Grid, communications between the IEDs in IEC 61850 Substation Automation System (SAS)...
2805
Authors: Bao Yuan Kang
Chapter 1: Mechatronics
Abstract:A verifiably encrypted signature scheme involves a signer, a verifier, and an adjudicator. It can convince a verifier that a given ciphertext...
914
Authors: Shem Mbandu Angolo, Kofi Armah Gabriel, Chun Xiang Xu, Domenic Mutiria Kamenyi
Chapter 10: Innovative Technologies in Area of Industrial Engineering and Management
Abstract:Reputation Based schemes are gaining popularity in all spheres of the service industry. In this paper, we have proposed a privacy preserving...
464