Proxy Re-encryption with Keyword Search: New Definitions and Algorithms
We propose a new definition for searchable proxy re-encryption scheme (Re-PEKS), define the first known searchable proxy re-encryption scheme with a designated tester (Re-dPEKS), and then give concrete constructions of both Re-PEKS and Re-dPEKS schemes that are secure in the random oracle model.
Saved in:
Published in | Security Technology, Disaster Recovery and Business Continuity Vol. 122; pp. 149 - 160 |
---|---|
Main Authors | , , , |
Format | Book Chapter |
Language | English |
Published |
Germany
Springer Berlin / Heidelberg
2010
Springer Berlin Heidelberg |
Series | Communications in Computer and Information Science |
Subjects | |
Online Access | Get full text |
ISBN | 3642176097 9783642176098 |
ISSN | 1865-0929 1865-0937 |
DOI | 10.1007/978-3-642-17610-4_17 |
Cover
Summary: | We propose a new definition for searchable proxy re-encryption scheme (Re-PEKS), define the first known searchable proxy re-encryption scheme with a designated tester (Re-dPEKS), and then give concrete constructions of both Re-PEKS and Re-dPEKS schemes that are secure in the random oracle model. |
---|---|
Bibliography: | Research supported by BGM Fund (MOSTI/BGM/R&D/500-2/8). |
ISBN: | 3642176097 9783642176098 |
ISSN: | 1865-0929 1865-0937 |
DOI: | 10.1007/978-3-642-17610-4_17 |