Improved anonymous proxy re-encryption with CCA security

@inproceedings{Zheng2014ImprovedAP,
  title={Improved anonymous proxy re-encryption with CCA security},
  author={Qingji Zheng and Wei Zhu and Jiafeng Zhu and Xinwen Zhang},
  booktitle={AsiaCCS},
  year={2014}
}
Outsourcing private data and heavy computation tasks to the cloud may lead to privacy breach as attackers (e.g., malicious outsiders or cloud administrators) may correlate any relevant information to penetrate information of their interests. Therefore, how to preserve cloud users' privacy has been a top concern when adopting cloud solutions. In this paper, we investigate the identity privacy problem for the proxy re-encryption, which allows any third party (e.g., cloud) to re-encrypt… CONTINUE READING

Citations

Publications citing this paper.
Showing 1-4 of 4 extracted citations

References

Publications referenced by this paper.
Showing 1-8 of 8 references

Anonymous proxy re-encryption

Security and Communication Networks • 2012
View 11 Excerpts
Highly Influenced

Chosen-Ciphertext Secure Proxy Re-Encryption without Pairings

IACR Cryptology ePrint Archive • 2008
View 8 Excerpts
Highly Influenced

Achieving key privacy without losing CCA security in proxy re-encryption

Journal of Systems and Software • 2012
View 11 Excerpts
Highly Influenced

Key-Private Proxy Re-Encryption

IACR Cryptology ePrint Archive • 2008
View 10 Excerpts
Highly Influenced

Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption

Public Key Cryptography • 2008
View 4 Excerpts
Highly Influenced

Chosen-ciphertext secure proxy re-encryption

ACM Conference on Computer and Communications Security • 2007
View 4 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…