Circular Transitivity of a Bidirectional Proxy Re-Encryption Scheme

Article Preview

Abstract:

The concept of proxy re-encryption (PRE) was first introduced by Blaze et al. Since then several CCA secure PRE schemes have been presented. Weng et al. proposed a non-transitive bidirectional PRE scheme without pairings and proved that their scheme to be PRE-CCA secure in the random oracle model under the CDH assumption. However, we show that Weng et als non-transitive scheme is still transitive under the formal definition of non-transitivity presented in this paper. Moreover, the transitivity of Weng et al.s scheme also implies that it is not PRE-CCA secure.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2639-2642

Citation:

Online since:

June 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] M. Blaze, G. Bleumer and M. Strauss: EUROCRYPT 1998(Espoo, Finland, 1998), Vol. 1403, p.127–144.

Google Scholar

[2] T. ElGamal: CRYPTO'1984(Santa Barbara, California, USA, 1984), Vol. 196, pp.10-18.

Google Scholar

[3] G. Ateniese and K. Fu: ACM Tran.Inf.Syst.Secur, Vol. 9 (2006) No.1, p.1–30.

Google Scholar

[4] R. Canetti and S. Hohenberger: ACM Conference on Computer and Communications Security(Alexandria, VA, U.S.A, Oct 29-Nov 2, 2007), pp.185-194.

Google Scholar

[5] B. Libert and D. Vergnaud: IEEE Transaction on Information Theory, Vol.57 (2011) No.3, pp.360-379.

Google Scholar

[6] J. Weng, M.R. Chen, Y. Yang, R.H. Deng and F. Bao: Sci.China Information Sciences, Vol. 53 (2010), pp.593-606.

Google Scholar

[7] J. Shao, Z.F. Cao, X. Liang and H. Lin: Information Science, Vol. 180 (2010) No.20, p.4042–4059.

Google Scholar

[8] J. Weng, R.H. Deng, X.H. Ding, C.K. Chu and J.Z. Lai: AsiaCCS 2009(Sydney, Australia, March 10-12, 2009), pp.322-332.

Google Scholar

[9] X.A. Wang, X.Y. Huang, X.Y. Yang, L.F. Liu and X.G. Wu: The Journal of Systems and Software, Vol. 85 (2012) No.3, pp.643-654.

Google Scholar

[10] L.M. Fang, W. Susilo, C.P. Ge and J.D. Wang: The Journal of Systems and Software, Vol. 84 (2011) No.12, pp.2293-2302.

Google Scholar

[11] J. Weng, R.H. Deng, S. Liu and K. Chen: Information Sciences, Vol. 180 (2010), pp.5077-5089.

Google Scholar