{"title":"多用途条件代理重加密","authors":"L. Mo, Guoxiang Yao","doi":"10.1109/ISCC-C.2013.90","DOIUrl":null,"url":null,"abstract":"In this paper a scheme named multi-use conditional proxy re-encryption based on ECC is proposed first, which can be used in the following email service scenarios: Alice can delegate her decryption rights to Bob for an encrypted mails sent to her, which contains a specific word and satisfies the condition set on the proxy by Alice, and Bob also can delegate the right to others just like Alice through the proxy, as the condition set by him is satisfied, and so on if required. Furthermore, as an important part for fulfilling our main goal, a new method to generate the partial re-encryption keys is proposed, and the security of our scheme is proven secure against chosen cipher text attacks based on the random oracle model.","PeriodicalId":313511,"journal":{"name":"2013 International Conference on Information Science and Cloud Computing Companion","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2013-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"Multi-Use Conditional Proxy Re-encryption\",\"authors\":\"L. Mo, Guoxiang Yao\",\"doi\":\"10.1109/ISCC-C.2013.90\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper a scheme named multi-use conditional proxy re-encryption based on ECC is proposed first, which can be used in the following email service scenarios: Alice can delegate her decryption rights to Bob for an encrypted mails sent to her, which contains a specific word and satisfies the condition set on the proxy by Alice, and Bob also can delegate the right to others just like Alice through the proxy, as the condition set by him is satisfied, and so on if required. Furthermore, as an important part for fulfilling our main goal, a new method to generate the partial re-encryption keys is proposed, and the security of our scheme is proven secure against chosen cipher text attacks based on the random oracle model.\",\"PeriodicalId\":313511,\"journal\":{\"name\":\"2013 International Conference on Information Science and Cloud Computing Companion\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2013-12-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2013 International Conference on Information Science and Cloud Computing Companion\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISCC-C.2013.90\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2013 International Conference on Information Science and Cloud Computing Companion","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISCC-C.2013.90","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
In this paper a scheme named multi-use conditional proxy re-encryption based on ECC is proposed first, which can be used in the following email service scenarios: Alice can delegate her decryption rights to Bob for an encrypted mails sent to her, which contains a specific word and satisfies the condition set on the proxy by Alice, and Bob also can delegate the right to others just like Alice through the proxy, as the condition set by him is satisfied, and so on if required. Furthermore, as an important part for fulfilling our main goal, a new method to generate the partial re-encryption keys is proposed, and the security of our scheme is proven secure against chosen cipher text attacks based on the random oracle model.