Fully secure inner-product proxy re-encryption with constant size ciphertext

Backes M, Gagné M, Thyagarajan SAK (2015)


Publication Status: Published

Publication Type: Conference contribution, Conference Contribution

Publication year: 2015

Publisher: Association for Computing Machinery, Inc

Pages Range: 31-40

ISBN: 9781450334471

DOI: 10.1145/2732516.2732525

Abstract

In this paper, we present a new inner product proxy reencryption scheme. The scheme can easily be converted into an attribute-based proxy re-encryption scheme for threshold policies, and can be used to provide fine-grained access control in cloud storage systems. Our scheme is very efficient, requiring a number of exponentiations that is linear in the length of the vector and a constant number of pairing computations for encryption and decryption. The length of the ciphertext is also independent of the length of the vector. The scheme is proven adaptively secure under standard assumptions in groups of composite orders.

Authors with CRIS profile

Involved external institutions

How to cite

APA:

Backes, M., Gagné, M., & Thyagarajan, S.A.K. (2015). Fully secure inner-product proxy re-encryption with constant size ciphertext. In Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, SCC 2015 (pp. 31-40). Association for Computing Machinery, Inc.

MLA:

Backes, Michael, Martin Gagné, and Sri Aravinda Krishnan Thyagarajan. "Fully secure inner-product proxy re-encryption with constant size ciphertext." Proceedings of the 3rd ACM International Workshop on Security in Cloud Computing, SCC 2015 Association for Computing Machinery, Inc, 2015. 31-40.

BibTeX: Download