Key-Private Proxy Re-Encryption from Lattices, Revisited

Ryo NISHIMAKI  Keita XAGAWA  

Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences   Vol.E98-A   No.1   pp.100-116
Publication Date: 2015/01/01
Online ISSN: 1745-1337
Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Based Cryptography
Keyword: 
proxy re-encryption,  key privacy,  anonymity,  lattices,  

Full Text: PDF(616.6KB)
>>Buy this Article


Summary: 
We propose two unidirectional proxy re-encryption schemes from the LWE assumptions. The schemes enjoy key privacy defined by Ateniese, Benson, and Hohenberger (CT-RSA 2009), that is, a delegator and a delegatee of a re-encryption key are anonymous.