Secure certificateless Proxy Re-encryption without pairing

Veronika Kuchta, Gaurav Sharma, Rajeev Anand Sahu, Tarunpreet Bhatia, Olivier Markowitch

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearch

3 Citations (Scopus)


A Proxy Re-encryption (PRE) is a cryptographic scheme for delegation of decryption rights. In a PRE scheme, a semi-honest proxy agent of Bob re-encrypts the ciphertext, on the message intended for Alice, on behalf of Bob, without learning anything about the message. The PRE schemes are useful in the scenarios where data are desired to be shared with the authorized users over the cloud. For such important applications, in this paper, we present an efficient and secure proxy re-encryption scheme. To avoid the overhead due to certification and to get rid of the key escrow issue of identity-based setting, we construct our scheme on the certificateless setting. The scheme has been proved secure in random oracle model under the standard assumption, the hardness of the computational Diffie-Hellman problem (CDHP). Moreover, as we device a pairing-free construction, our scheme is significantly more efficient than the best available scheme.

Original languageEnglish
Title of host publicationAdvances in Information and Computer Security
Subtitle of host publication12th International Workshop on Security, IWSEC 2017 Hiroshima, Japan, August 30 – September 1, 2017 Proceedings
EditorsSatoshi Obana, Koji Chida
Place of PublicationCham Switzerland
Number of pages17
ISBN (Electronic)9783319642000
ISBN (Print)9783319641997
Publication statusPublished - 2017
Externally publishedYes
EventInternational Workshop on Security 2017 - Hiroshima, Japan
Duration: 30 Aug 20171 Sept 2017
Conference number: 12th

Publication series

NameLecture Notes in Computer Science
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


ConferenceInternational Workshop on Security 2017
Abbreviated titleIWSEC 2017
Internet address


  • Certificateless proxy re-encryption
  • Computational Diffie-Hellman (CDH) problem
  • Random oracle model
  • Secure data sharing

Cite this