Proxy Re-encryption Scheme from IBE to CBE

被引:2
|
作者
Wang, Xu An
Yang, Xiaoyuan
Zhang, Minqing
机构
关键词
IDENTITY-BASED ENCRYPTION;
D O I
10.1109/DBTA.2009.47
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption [3]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice's public key into one that can be opened under Bob's decryption key. They predicated that proxy reencryption and re-signature will play an important role in our life. In 2007, Matsuo proposed the concept of four types of reencryption schemes: CBE to IBE(type 1), IBE to IBE(type 2), IBE to CBE (type 3), CBE to CBE (type 4) [17]. Now CBE to IBE and IBE to IBE proxy re-encryption schemes are being standardized by IEEEP1363.3 working group [18]. In this paper, based on [17] we propose a proxy re-encryption scheme from IBE to CBE. To the best of our knowledge, this is the first type 3 scheme. We give the security model for proxy re-encryption scheme from IBE to CBE and prove our scheme's security in this model without random oracle.
引用
收藏
页码:99 / 102
页数:4
相关论文
共 50 条
  • [31] Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography
    Syalim, Amril
    Nishide, Takashi
    Sakurai, Kouichi
    2017 INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2017), 2017, : 105 - 111
  • [32] An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing
    Selvi, S. Sharmila Deva
    Paul, Arinjita
    Rangan, Chandrasekaran Pandu
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 413 - 433
  • [33] A proxy re-encryption scheme based on elliptic curve group
    Yin, Shou-Lin (352720214@qq.com), 1600, Ubiquitous International (08):
  • [34] A new RSA-based proxy re-encryption scheme
    Wang, Liangliang
    Chen, Kefei
    Long, Yu
    Mao, Xianping
    Journal of Computational Information Systems, 2015, 11 (02): : 567 - 575
  • [35] A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
    Tang, Yongli
    Lian, Huanhuan
    Zhao, Zemao
    Yan, Xixi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (02): : 339 - 352
  • [36] A BGN-Type Homomorphic Proxy Re-Encryption Scheme
    Liu, Shu-Guang
    Zhang, Wei
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 226 - 229
  • [37] A Homomorphic Proxy Re-encryption from Lattices
    Ma, Chunguang
    Li, Juyan
    Ouyang, Weiping
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 353 - 372
  • [38] Non-transitive Bidirectional Proxy Re-encryption Scheme
    Zhang, Jindan
    Wang, Xu An
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 213 - 216
  • [39] Group-based unidirectional proxy re-encryption scheme
    School of Information and Communication, Guilin University of Electronic and Technology, Guilin, Guangxi, 541004, China
    Inf. Technol. J., 2009, 1 (83-88):
  • [40] Identity Based Proxy Re-encryption Scheme under LWE
    Yin, Wei
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zheng Ping
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12): : 6116 - 6132