Efficient IBE-PKE proxy re-encryption

被引:0
|
作者
Mizuno, Takeo [1 ]
Doi, Hiroshi [1 ]
机构
[1] NTT Data Corp, Koutou Ku, 3-3-3 Toyosu, Tokyo, Japan
来源
SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2008年
关键词
proxy re-encryption; public key encryption; identity-based encryption; bilinear maps;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In proxy re-encryption schemes, a semi-trusted entity called proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only one scheme which enables the conversion of IBE ciphertexts to PKE ciphertexts has been proposed and it has some drawbacks. In that scheme, the size of the re-encrypted ciphertext increases and Bob must be aware of existence of the proxy, which means Bob cannot decrypt a re-encrypted ciphertext with same PKE decryption algorithm. We propose a new, efficient scheme that enables the conversion of IBE ciphertexts to PKE ciphertexts, and prove CPA security in the standard model. In our scheme, the size of the re-encrypted ciphertext is optimal and Bob does not aware of existence of the proxy. As far as we knows, this is the first IBE-PKE type scheme that holds the above properties.
引用
收藏
页码:285 / +
页数:2
相关论文
共 50 条
  • [31] Proxy re-encryption via indistinguishability obfuscation
    Ohata, Satsuya
    Matsuura, Kanta
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1786 - 1795
  • [32] Non-transferable Proxy Re-encryption
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    COMPUTER JOURNAL, 2019, 62 (04) : 490 - 506
  • [33] Improved Proxy Re-Encryption With Delegatable Verifiability
    Zhan, Yu
    Wang, Baocang
    Wang, Zheng
    Pei, Tao
    Chen, Yuan
    Qu, Quanbo
    Zhang, Zhili
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 592 - 602
  • [34] Realizing Proxy Re-encryption in the Symmetric World
    Syalim, Amril
    Nishide, Takashi
    Sakurai, Kouichi
    INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 259 - 274
  • [35] A Homomorphic Proxy Re-encryption from Lattices
    Ma, Chunguang
    Li, Juyan
    Ouyang, Weiping
    PROVABLE SECURITY, (PROVSEC 2016), 2016, 10005 : 353 - 372
  • [36] Cryptanalysis of Unidirectional Proxy Re-Encryption Scheme
    Singh, Kunwar
    Rangan, C. Pandu
    Banerjee, A. K.
    INFORMATION AND COMMUNICATION TECHNOLOGY, 2014, 8407 : 564 - 575
  • [37] Proxy re-encryption with plaintext checkable encryption for integrating digital twins into IIoT
    Hadabi, Abdalla
    Qu, Zheng
    Elhabob, Rashad
    Kumar, Sachin
    Yeh, Kuo-Hui
    Kumari, Saru
    Xiong, Hu
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 116
  • [38] Chosen-Ciphertext Secure Certificateless Proxy Re-Encryption
    Sur, Chul
    Jung, Chae Duk
    Park, Youngho
    Rhee, Kyung Hyune
    COMMUNICATIONS AND MULTIMEDIA SECURITY, PROCEEDINGS, 2010, 6109 : 214 - +
  • [39] Anonymous Conditional Proxy Re-encryption without Random Oracle
    Fang, Liming
    Susilo, Willy
    Wang, Jiandong
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 47 - +
  • [40] CCA secure and efficient proxy re-encryption scheme without bilinear pairing
    Prasad, Shilpee
    Purushothama, B. R.
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58