Efficient IBE-PKE proxy re-encryption

被引:0
|
作者
Mizuno, Takeo [1 ]
Doi, Hiroshi [1 ]
机构
[1] NTT Data Corp, Koutou Ku, 3-3-3 Toyosu, Tokyo, Japan
来源
SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY | 2008年
关键词
proxy re-encryption; public key encryption; identity-based encryption; bilinear maps;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In proxy re-encryption schemes, a semi-trusted entity called proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only one scheme which enables the conversion of IBE ciphertexts to PKE ciphertexts has been proposed and it has some drawbacks. In that scheme, the size of the re-encrypted ciphertext increases and Bob must be aware of existence of the proxy, which means Bob cannot decrypt a re-encrypted ciphertext with same PKE decryption algorithm. We propose a new, efficient scheme that enables the conversion of IBE ciphertexts to PKE ciphertexts, and prove CPA security in the standard model. In our scheme, the size of the re-encrypted ciphertext is optimal and Bob does not aware of existence of the proxy. As far as we knows, this is the first IBE-PKE type scheme that holds the above properties.
引用
收藏
页码:285 / +
页数:2
相关论文
共 50 条
  • [41] Flexible attribute-based proxy re-encryption for efficient data sharing
    Deng, Hua
    Qin, Zheng
    Wu, Qianhong
    Guan, Zhenyu
    Zhou, Yunya
    INFORMATION SCIENCES, 2020, 511 (511) : 94 - 113
  • [42] Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model
    Jiang Mingming
    Guo Yuyan
    Yu Lei
    Song Wangan
    Wei Shimin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (01) : 61 - 66
  • [43] Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
    Libert, Benoit
    Vergnaud, Damien
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (03) : 1786 - 1802
  • [44] Efficient Attribute-Based Proxy Re-Encryption with Constant Size Ciphertexts
    Paul, Arinjita
    Selvi, S. Sharmila Deva
    Rangan, C. Pandu
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2020, 2020, 12578 : 644 - 665
  • [45] Efficient bidirectional proxy re-encryption with direct chosen-ciphertext security
    Guo, Lifeng
    Hu, Lei
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 2012, 63 (01) : 151 - 157
  • [46] DEVELOPMENT ON SECURITY MODELS FOR PROXY RE-ENCRYPTION SCHEMES
    Lo, Mamadou Makhtar
    Sow, Demba
    Ben Maaouia, Mohamed
    JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2024, 63 (01): : 1 - 21
  • [47] Accountable Proxy Re-Encryption for Secure Data Sharing
    Guo, Hui
    Zhang, Zhenfeng
    Xu, Jing
    An, Ningyu
    Lan, Xiao
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (01) : 145 - 159
  • [48] Homomorphic Proxy Re-Encryption and Multiparty Cloud Computing
    Liu, Shu-Guang
    Zhang, Wei
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 222 - 225
  • [49] QR Code Security using Proxy Re-Encryption
    Akhil, N., V
    Vijay, Athira
    Kumar, Deepa S.
    PROCEEDINGS OF IEEE INTERNATIONAL CONFERENCE ON CIRCUIT, POWER AND COMPUTING TECHNOLOGIES (ICCPCT 2016), 2016,
  • [50] Performance Analysis of the Symmetric Proxy Re-encryption Scheme
    Meiliasari, Rizky Putri
    Syalim, Amril
    Yazid, Setiadi
    2019 4TH INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2019), 2019, : 91 - 96