Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Issue title: Special Issue on Advanced Cryptographic Techniques for Cloud and Big Data Computation
Guest editors: Fatos Xhafa and Zhenfu Cao
Article type: Research Article
Authors: Wang, Lichenga | Li, Jinga | Gu, Lizea | Yan, Jianhuaa | Qu, Zhiguob; †
Affiliations: [a] Beijing University of Posts and Telecommunications, Beijing 100876, P.R. China. {wanglc, glzisc}@bupt.edu.cn, [email protected] | [b] Nanjing University of Information Science and Technology, Nanjing 210044 P.R. China. [email protected]
Correspondence: [†] Address for correspondence: Jiangsu Engineering Center of Network Monitoring, School of Computer and Software, Nanjing University of Information Science and Technology, Nanjing 210044 P.R. China
Note: [*] An extended abstract of this work is to appear at INCoS 2016 [30], this is the full version.
Abstract: Proxy re-encryption (PRE) enables a semi-trusted proxy to transfer Alice’s secrets into Bob’s secrets but without seeing the secrets. This functionality is very interesting for making balance between the information confidentiality and the mutual accessibility in various scenarios such as public cloud storage systems. During the past decades, many smart PRE schemes were built based on intractability assumptions such as integer factorization problems (IFP) and discrete logarithm problems (DLP). However, Shor’s efficient quantum algorithms for IFP and DLP stand great threats towards the security baseline of these schemes. Enlightened by Gu et al.’s recent work on resisting known quantum attacks, we propose an efficient PRE scheme based on the intractability of the (semi)group factorization problems in this paper. The security of the proposed scheme is analyzed according to some heuristic attacks. Moreover, a special instantiation technique is present in detail, and some illustrations are provided for manifesting the effectiveness and efficiency of the proposed methodology.
Keywords: Proxy re-encryption, quantum attack resistant, group factorization, non-commutative cryptography
DOI: 10.3233/FI-2018-1617
Journal: Fundamenta Informaticae, vol. 157, no. 1-2, pp. 47-62, 2018
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]