|
For Full-Text PDF, please login, if you are a member of IEICE,
or go to Pay Per View on menu list, if you are a nonmember of IEICE.
|
Key-Private Proxy Re-Encryption from Lattices, Revisited
Ryo NISHIMAKI Keita XAGAWA
Publication
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Vol.E98-A
No.1
pp.100-116 Publication Date: 2015/01/01 Online ISSN: 1745-1337
DOI: 10.1587/transfun.E98.A.100 Type of Manuscript: Special Section PAPER (Special Section on Cryptography and Information Security) Category: Public Key Based Cryptography Keyword: proxy re-encryption, key privacy, anonymity, lattices,
Full Text: PDF(616.6KB)>>
Summary:
We propose two unidirectional proxy re-encryption schemes from the LWE assumptions. The schemes enjoy key privacy defined by Ateniese, Benson, and Hohenberger (CT-RSA 2009), that is, a delegator and a delegatee of a re-encryption key are anonymous.
|
|
|