2004
DOI: 10.1007/978-3-540-24660-2_14
|View full text |Cite
|
Sign up to set email alerts
|

Universal Re-encryption for Mixnets

Abstract: We introduce a new cryptographic technique that we call universal re-encryption. A conventional cryptosystem that permits re-encryption, such as ElGamal, does so only for a player with knowledge of the public key corresponding to a given ciphertext. In contrast, universal reencryption may be performed without knowledge of public keys. We demonstrate an asymmetric cryptosystem with universal re-encryption that is half as efficient as standard ElGamal in terms of both computation and storage. While technically a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
207
0
1

Year Published

2005
2005
2023
2023

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 279 publications
(208 citation statements)
references
References 20 publications
0
207
0
1
Order By: Relevance
“…We randomize a key by computing C(1; r * r ) for a random r (this can be computed using ⊗ by square-and-multiply). Encryption corresponds to computing C(m; r + s) by multiplying a freshly randomized public key C(1; r + s) with the ciphertext C(m; 0), i.e., the message encrypted with randomness zero-see also [11].…”
Section: Instantiationmentioning
confidence: 99%
“…We randomize a key by computing C(1; r * r ) for a random r (this can be computed using ⊗ by square-and-multiply). Encryption corresponds to computing C(m; r + s) by multiplying a freshly randomized public key C(1; r + s) with the ciphertext C(m; 0), i.e., the message encrypted with randomness zero-see also [11].…”
Section: Instantiationmentioning
confidence: 99%
“…Another notion with a similar name is universal re-encryption [GJJS04], in which the ciphertexts are re-randomized, but the underlying public keys are not changed as in PRE.…”
Section: Related Notionsmentioning
confidence: 99%
“…There have been many papers which are hash-based [2,4,3,5,7,9,14,15,17], pseudonym-based [1,12], zero knowledge-based [16] using PUF(Physical Unclonable Function), and tree-based protocol [8] using pseudonym generator that attempts to address the security concerns raised as using RFID tags, but it is believed that there is no perfect protocol that avoids all of the threats with reasonably low cost until now. Hash Lock Scheme [14](denoted by "HLS") is based on one-way hash function; HLS is traceable.…”
Section: Previous Workmentioning
confidence: 99%
“…Ohkubo et al protocol [9](denoted by "OSK") is untraceable, but unscalable. Wong et al [6] and Tuyls et al protocol [16] can be traceable; and also, pseudonym-based protocols [1,12] can be traceable after A collects all of the pseudonyms.…”
Section: Previous Workmentioning
confidence: 99%