Efficient IBE-PKE proxy re-encryption

被引:0
|
作者
Mizuno, Takeo [1 ]
Doi, Hiroshi [1 ]
机构
[1] NTT Data Corp, Koutou Ku, 3-3-3 Toyosu, Tokyo, Japan
来源
SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2008年
关键词
proxy re-encryption; public key encryption; identity-based encryption; bilinear maps;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In proxy re-encryption schemes, a semi-trusted entity called proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only one scheme which enables the conversion of IBE ciphertexts to PKE ciphertexts has been proposed and it has some drawbacks. In that scheme, the size of the re-encrypted ciphertext increases and Bob must be aware of existence of the proxy, which means Bob cannot decrypt a re-encrypted ciphertext with same PKE decryption algorithm. We propose a new, efficient scheme that enables the conversion of IBE ciphertexts to PKE ciphertexts, and prove CPA security in the standard model. In our scheme, the size of the re-encrypted ciphertext is optimal and Bob does not aware of existence of the proxy. As far as we knows, this is the first IBE-PKE type scheme that holds the above properties.
引用
收藏
页码:285 / +
页数:2
相关论文
共 50 条
  • [21] Proxy Re-encryption from Lattices
    Kirshanova, Elena
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 77 - 94
  • [22] Fuzzy conditional proxy re-encryption
    LiMing Fang
    JianDong Wang
    ChunPeng Ge
    YongJun Ren
    Science China Information Sciences, 2013, 56 : 1 - 13
  • [23] Conditional Proxy Broadcast Re-Encryption
    Chu, Cheng-Kang
    Weng, Jian
    Chow, Sherman S. M.
    Zhou, Jianying
    Deng, Robert H.
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 327 - +
  • [24] Fuzzy conditional proxy re-encryption
    FANG LiMing
    WANG JianDong
    GE ChunPeng
    REN YongJun
    ScienceChina(InformationSciences), 2013, 56 (05) : 211 - 223
  • [25] Improved Proxy Re-encryption Scheme with Equality Test
    Yang, Chih-Chen
    Tso, Raylin
    Liu, Zi-Yuan
    Hsu, Jen-Chieh
    Tseng, Yi-Fan
    2021 16TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2021), 2021, : 37 - 44
  • [26] Revocable attribute-based proxy re-encryption
    Luo, Fucai
    Al-Kuwari, Saif
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) : 465 - 482
  • [27] Efficient Conditional Proxy Re-Encryption with Chosen-Ciphertext Security
    Qiu, JunJie
    Hwang, Gi-Hyun
    Lee, HoonJae
    2014 NINTH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIA JCIS), 2014, : 104 - 110
  • [28] A proxy broadcast re-encryption for cloud data sharing
    Sun, Maosheng
    Ge, Chunpeng
    Fang, Liming
    Wang, Jiandong
    MULTIMEDIA TOOLS AND APPLICATIONS, 2018, 77 (09) : 10455 - 10469
  • [29] Proxy Re-Encryption Scheme Supporting a Selection of Delegatees
    Devigne, Julien
    Guerrini, Eleonora
    Laguillaumie, Fabien
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2014, 2014, 8469 : 13 - 30
  • [30] Efficient and Secure MPC Through Integration of FHE and Proxy Re-encryption
    Rohitkumar R. Upadhyay
    Sahadeo Padhye
    SN Computer Science, 6 (2)