Identity-based proxy re-encryption without random oracles

被引:0
|
作者
Chu, Cheng-Kang [1 ]
Tzeng, Wen-Guey [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
来源
INFORMATION SECURITY, PROCEEDINGS | 2007年 / 4779卷
关键词
proxy re-encryption; identity-based encryption; standard model;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a ciphertext for Alice into the ciphertext for Bob. In this paper, we propose two identity-based proxy re-encryption schemes, which are both proved secure in the standard model. The first one is efficient in both computation and ciphertext length, and the other one achieves chosen-ciphertext security. Our solutions answer the open problems left in the previous work.
引用
收藏
页码:189 / +
页数:3
相关论文
共 50 条
  • [31] Identity-based conditional proxy re-encryption with fine grain policy
    Ge, Chunpeng
    Susilo, Willy
    Wang, Jiandong
    Fang, Liming
    COMPUTER STANDARDS & INTERFACES, 2017, 52 : 1 - 9
  • [32] Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles
    Seo, Jae Woo
    Yum, Dae Hyun
    Lee, Pil Joong
    THEORETICAL COMPUTER SCIENCE, 2013, 491 : 83 - 93
  • [33] Fully anonymous identity-based broadcast encryption without random oracles
    Ren, Y. (ryl1982@shu.edu.cn), 1600, Femto Technique Co., Ltd. (16):
  • [34] Identity-Based Encryption Resilient to Continual Leakage Without Random Oracles
    Guo, Yuyan
    Jiang, Mingming
    Wei, Shimin
    Xie, Ming
    Sun, Mei
    FRONTIERS IN CYBER SECURITY, FCS 2019, 2019, 1105 : 53 - 64
  • [35] New Constructions of Identity-based Broadcast Encryption without Random Oracles
    Zhang, Leyou
    Wu, Qing
    Hu, Yupu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2011, 5 (02): : 428 - 439
  • [36] Efficient Anonymous Identity-Based Broadcast Encryption without Random Oracles
    Xie Li
    Ren Yanli
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (02) : 40 - 51
  • [37] Identity-Based Proxy Re-encryption over NTRU Lattices for Cloud Computing
    Yue, Na
    Wang, Yang
    Wang, Mingqiang
    2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 264 - 269
  • [38] New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks
    Wang, Lihua
    Wang, Licheng
    Mambo, Masahiro
    Okamoto, Eiji
    PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 327 - +
  • [39] A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage
    Luo, Wei
    Ma, Wenping
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 519 - 530
  • [40] Identity-based re-encryption scheme with lightweight re-encryption key generation
    Liu, Liang
    Ye, Jun
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2018, 21 (01): : 41 - 57