Divertible Protocols and Atomic Proxy Cryptography

@inproceedings{Blaze1998DivertiblePA,
  title={Divertible Protocols and Atomic Proxy Cryptography},
  author={Matt Blaze and Gerrit Bleumer and Martin Strauss},
  booktitle={EUROCRYPT},
  year={1998}
}
First, we introduce the notion of divertibility as a protocol property as opposed to the existing notion as a language property (see Okamoto, Ohta [OO90. [...] Key Method Next, we introduce atomic proxy cryptography, in which an atomic proxy function, in conjunction with a public proxy key, converts ciphertexts (messages or signatures) for one key into ciphertexts for another. Proxy keys, once generated, may be made public and proxy functions applied in untrusted environments.Expand
PRE - Stronger Security Notion and Efficient Construction with New Property
TLDR
The first proxy re-encryption with non-interactive opening (PRENO) scheme is introduced, and the notions of security against chosen ciphertext attacks (CCA) and proof soundness are defined and proved in a strong security model under a well-studied assumption in the standard model. Expand
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
TLDR
This paper presents the first construction of unidirectional proxy re-encryption scheme with chosen-ciphertext security in the standard model (i.e. without relying on the random oracle idealization), which solves a problem left open at CCS'07. Expand
Key-Private Proxy Re-encryption under LWE
TLDR
This paper proposes a CPA-secure PK-PRE scheme in the standard model (which is then transformed into a CCA-secure scheme inThe random oracle model), and examines the practical hardness of the LWE assumption, using Kannan's exhaustive search algorithm coupling with pruning techniques. Expand
Towards a Secure Certificateless Proxy Re-Encryption Scheme
TLDR
A security definition against (replayable) chosen ciphertext attack (CCA) for certificateless proxy re-encryption (CL-PRE) schemes and an attack to the chosen plaintext secure CL-PRE scheme proposed by Xu et al. Expand
Advances in signatures, encryption, and E-Cash from bilinear groups
TLDR
This work presents the first public key signature scheme where a semi-trusted proxy, given special information, can translate Alice's signature on a message into Bob's signatures on the same message, and presents new formal definitions, algorithms, and motivating applications for three natural cryptographic constructions. Expand
A Provably Secure Conditional Proxy Re-Encryption Scheme without Pairing
TLDR
This work proposes the first construction of an efficient CPRE scheme without pairing, satisfying chosen ciphertext security under the computational Diffie Hellman (CDH) assumption and its variant in the random oracle model. Expand
Proxy Re-Encryption Schemes with Key Privacy from LWE
TLDR
The CPA-secure scheme is implemented and it is pointed out that, among many applications, it can be sufficiently used for the practical task of key rotation over encrypted data. Expand
Proxy re-signatures: new definitions, algorithms, and applications
TLDR
Two secure proxy re-signature schemes based on bilinear maps are presented, one of which relies on the Computational Diffie-Hellman (CDH) assumption and the other on the CDH and 2-Discrete Logarithm (2-DL) assumptions, which achieves a stronger security guarantee. Expand
New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
TLDR
An identity-based unidirectional PRE scheme is presented, which not only is provably secure against the chosen ciphertext attack in the standard model but also achieves the master secret security at the same time. Expand
Tracing Malicious Proxies in Proxy Re-encryption
TLDR
This paper proposes traceable proxy re-encryptionsystems, where proxies that leak their re- Encryption key can be identified by the delegator, and gives security definitions for this new primitive and a construction meeting the formalized requirements. Expand
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 25 REFERENCES
On Protocol Divertibility
  • G. Bleumer
  • Computer Science
  • IACR Cryptol. ePrint Arch.
  • 1998
TLDR
A definition of protocol divertibility is given that applies to arbitrary 2-party protocols and is compatible with Okamoto and Ohta’s definition in the case of interactive zero-knowledge proofs. Expand
Any Language in IP Has a Divertable ZKIP
TLDR
There exists a perfectly divertible perfect zero-knowledge interactive proof system for graph non-isomorphism (GNI) without any unproven assumption. Expand
A method for obtaining digital signatures and public-key cryptosystems
TLDR
An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the corresponding decryption key, soriers or other secure means are not needed to transmit keys. Expand
An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations
TLDR
It is proved that the sequential versions of these protocols do not reveal any "knowledge" about the discrete logarithm(s) in a well-defined sense, provided that A knows (a multiple of) the order of α. Expand
Yvo Desmedt: All Languages in NP Have Divertible Zero-Knowledge Proofs and Arguments Under Cryptographic Assumptions
TLDR
A divertible zero-knowledge proof for graph isomorphism is presented under the assumption that probabilistic encryption homomorphisms exist and the consequences for abuse-free zero- knowledge proofs are considered. Expand
Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications
TLDR
This paper presents the Meta-blind signature schemes which have been developed from the ElGamal based blind signature scheme and the message recoveryblind signature scheme discovered recently, and extracts various variants from which some are more efficient than the already known ones. Expand
Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility
TLDR
It is shown that any commutative random self-reducible problem, which is a variant of the randomSelfReduction problem introduced by Angluin et al., has a divertible perfect zero knowledge interactive proof. Expand
How to Prove Yourself: Practical Solutions to Identification and Signature Problems
TLDR
Simple identification and signature schemes which enable any user to prove his identity and the authenticity of his messages to any other user without shared or public keys are described. Expand
A public key cryptosystem and a signature scheme based on discrete logarithms
TLDR
A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a public key cryptosystem that relies on the difficulty of computing discrete logarithms over finite fields. Expand
New directions in cryptography
TLDR
This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing. Expand
...
1
2
3
...