Proxy Re-encryption Scheme from IBE to CBE

被引:2
|
作者
Wang, Xu An
Yang, Xiaoyuan
Zhang, Minqing
机构
关键词
IDENTITY-BASED ENCRYPTION;
D O I
10.1109/DBTA.2009.47
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption [3]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice's public key into one that can be opened under Bob's decryption key. They predicated that proxy reencryption and re-signature will play an important role in our life. In 2007, Matsuo proposed the concept of four types of reencryption schemes: CBE to IBE(type 1), IBE to IBE(type 2), IBE to CBE (type 3), CBE to CBE (type 4) [17]. Now CBE to IBE and IBE to IBE proxy re-encryption schemes are being standardized by IEEEP1363.3 working group [18]. In this paper, based on [17] we propose a proxy re-encryption scheme from IBE to CBE. To the best of our knowledge, this is the first type 3 scheme. We give the security model for proxy re-encryption scheme from IBE to CBE and prove our scheme's security in this model without random oracle.
引用
收藏
页码:99 / 102
页数:4
相关论文
共 50 条
  • [41] A Symmetric Authenticated Proxy Re-encryption Scheme with Provable Security
    Peng, Zhiniang
    Tang, Shaohua
    Jiang, Linzhi
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 86 - 99
  • [42] Collusion-Resistant Unidirectional Proxy Re-Encryption Scheme from Lattices
    Kim, Kee Sung
    Jeong, Ik Rae
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2016, 18 (01) : 1 - 7
  • [43] A CP-ABE Scheme with Cloud Proxy Re-Encryption
    Zhao K.-Q.
    Kang P.
    Liu B.
    Guo Z.
    Feng C.-S.
    Qing Y.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (03): : 728 - 735
  • [44] Unidirectional Updatable Encryption and Proxy Re-encryption from DDH
    Miao, Peihan
    Patranabis, Sikhar
    Watson, Gaven
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2023, PT II, 2023, 13941 : 368 - 398
  • [45] Proxy Re-Encryption Based on Homomorphic Encryption
    Bellafqira, Reda
    Coatrieux, Gouenou
    Bouslimi, Dalel
    Quellec, Gwenole
    Cozic, Michel
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161
  • [46] IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability
    Wu Li-qiang
    Yang Xiao-yuan
    Zhang Min-qing
    Wang Xu-an
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 469 - 482
  • [47] IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability
    Wu Li-qiang
    Yang Xiao-yuan
    Zhang Min-qing
    Wang Xu-an
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 (1) : 469 - 482
  • [48] Proxy Re-Encryption and Re-Signatures from Lattices
    Fan, Xiong
    Liu, Feng-Hao
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, ACNS 2019, 2019, 11464 : 363 - 382
  • [49] Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption
    Hayashi, Ryotaro
    Matsushita, Tatsuyuki
    Yoshida, Takuya
    Fujii, Yoshihiro
    Okada, Koji
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2011, 7038 : 210 - +
  • [50] Fuzzy conditional proxy re-encryption
    Fang LiMing
    Wang JianDong
    Ge ChunPeng
    Ren YongJun
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) : 1 - 13