Proxy re-encryption systems for identity-based encryption

被引:0
|
作者
Matsuo, Toshihiko
机构
来源
Pairing-Based Cryptography - Pairing 2007 | 2007年 / 4575卷
关键词
proxy re-encryption system; public key encryption; identitybased encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice's public key into the different ciphertexts that can be decrypted by Bob's secret key. In this paper, we propose new proxy re-encryption systems; one for the transformation from ciphertexts encrypted under a traditional PKI-based public key into the ciphertexts that can be decrypted by an secret key for Identity-Based Encryption, and the other one for the transformation from ciphertexts encrypted in IBE manner into the different ciphertexts that can be decrypted by the other secret key for the IBE.
引用
收藏
页码:247 / 267
页数:21
相关论文
共 50 条
  • [41] Collusion-Resistant Identity-Based Proxy Re-Encryption Without Random Oracles
    Qiu, JunJie
    Jo, JungBok
    Lee, HoonJae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 337 - 344
  • [42] Dynamic identity-based broadcast proxy re-encryption for data sharing in autonomous vehicles
    Zhou, Yuanjian
    Cao, Zhenfu
    Dong, Xiaolei
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2023, 34 (11)
  • [43] A Chosen-Ciphertext Secure Fuzzy Identity-Based Proxy Re-Encryption Scheme
    Ge, Chunpeng
    Wang, Jiandong
    Fang, Liming
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 347 - 360
  • [44] Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices
    Zhuang, Er-Shuo
    Fan, Chun-, I
    MATHEMATICS, 2023, 11 (18)
  • [45] Autonomous Path Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
    Hu, Huidan
    Cao, Zhenfu
    Dong, Xiaolei
    IEEE ACCESS, 2022, 10 : 87322 - 87332
  • [46] Identity-based threshold proxy re-encryption scheme from lattices and its applications
    Wu, Liqiang
    Han, Yiliang
    Yang, Xiaoyuan
    Zhang, Minqing
    FRONTIERS OF INFORMATION TECHNOLOGY & ELECTRONIC ENGINEERING, 2022, 23 (02) : 258 - 277
  • [47] Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
    Xu, Peng
    Jiao, Tengfei
    Wu, Qianhong
    Wang, Wei
    Jin, Hai
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (01) : 66 - 79
  • [48] Identity-based proxy re-encryption scheme from RLWE assumption with ciphertext evolution
    Meng H.
    Ren L.
    Zhao Z.
    Journal of China Universities of Posts and Telecommunications, 2023, 30 (05): : 51 - 60
  • [49] Identity-based proxy re-encryption scheme from RLWE assumption with ciphertext evolution
    Meng Hui
    Ren Lina
    Zhao Zongqu
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2023, 30 (05) : 51 - 60
  • [50] Collusion-resistant identity-based proxy re-encryption without random oracles
    Department of Ubiquitous IT, Graduate School of Dongseo University, Busan, Korea, Republic of
    不详
    Int. J. Secur. Appl., 9 (337-344):