Analysis of One Proxy Re-Encryption Scheme

Abstract:

Article Preview

Unlike some earlier proxy re-encryption schemes, the LV08 scheme specifies a validity-checking process to guarantee that the received ciphertext is well-formed. In this paper, we clarify that the received message is well-formed is the premise to decryption in all encryption schemes. The underlying mechanism to keep the communicated message well-formed in encryption schemes is another topic. We will simplify the LV08 scheme and show its security level is the same as that of the AFGH05 scheme.

Info:

Periodical:

Edited by:

Robin G. Qiu and Yongfeng Ju

Pages:

284-288

DOI:

10.4028/www.scientific.net/AMM.135-136.284

Citation:

L. H. Liu and Z. J. Cao, "Analysis of One Proxy Re-Encryption Scheme", Applied Mechanics and Materials, Vols. 135-136, pp. 284-288, 2012

Online since:

October 2011

Export:

Price:

$35.00

In order to see related information, you need to Login.

In order to see related information, you need to Login.