Proxy Re-encryption Scheme from IBE to CBE

被引:2
|
作者
Wang, Xu An
Yang, Xiaoyuan
Zhang, Minqing
机构
关键词
IDENTITY-BASED ENCRYPTION;
D O I
10.1109/DBTA.2009.47
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption [3]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice's public key into one that can be opened under Bob's decryption key. They predicated that proxy reencryption and re-signature will play an important role in our life. In 2007, Matsuo proposed the concept of four types of reencryption schemes: CBE to IBE(type 1), IBE to IBE(type 2), IBE to CBE (type 3), CBE to CBE (type 4) [17]. Now CBE to IBE and IBE to IBE proxy re-encryption schemes are being standardized by IEEEP1363.3 working group [18]. In this paper, based on [17] we propose a proxy re-encryption scheme from IBE to CBE. To the best of our knowledge, this is the first type 3 scheme. We give the security model for proxy re-encryption scheme from IBE to CBE and prove our scheme's security in this model without random oracle.
引用
收藏
页码:99 / 102
页数:4
相关论文
共 50 条
  • [21] Towards a Secure Certificateless Proxy Re-Encryption Scheme
    Guo, Hui
    Zhang, Zhenfeng
    Zhang, Jiang
    Chen, Cheng
    PROVABLE SECURITY, 7TH INTERNATIONAL CONFERENCE, PROVSEC 2013, 2013, 8209 : 330 - 346
  • [22] Proxy Re-encryption Scheme Based on SK Identity Based Encryption
    Wang, Xu An
    Yang, Xiaoyuan
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 657 - 660
  • [23] On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010
    Weng, Jian
    Zhao, Yunlei
    Hanaoka, Goichiro
    PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 : 284 - +
  • [24] Robust Threshold Proxy Re-encryption Scheme from Ideal Lattices
    Wu L.-Q.
    Han Y.-L.
    Yang X.-Y.
    Zhang M.-Q.
    Yang K.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2020, 48 (09): : 1786 - 1794
  • [25] New Identity Based Proxy Re-Encryption Scheme from Lattices
    Wu, Ligiang
    Yang, Xiltoymin
    Zhang, Minqing
    Liu, Longfei
    CHINA COMMUNICATIONS, 2019, 16 (10) : 174 - 190
  • [26] New Identity Based Proxy Re-Encryption Scheme from Lattices
    Liqiang Wu
    Xiaoyuan Yang
    Minqing Zhang
    Longfei Liu
    中国通信, 2019, 16 (10) : 174 - 190
  • [27] A Multi-users Searchable Encryption Scheme with Proxy Re-encryption
    Zhang Ya-ling
    Liu Kai
    Wang Shang-ping
    Sun Qin-dong
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 563 - 567
  • [28] Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption
    Mizuno, Takeo
    Doi, Hiroshi
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 288 - +
  • [29] Combined Proxy Re-encryption
    Canard, Sebastien
    Devigne, Julien
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 49 - 66
  • [30] Anonymous proxy re-encryption
    Shao, Jun
    Liu, Peng
    Wei, Guiyi
    Ling, Yun
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 439 - 449