Secure and Efficient IBE-PKE Proxy Re-Encryption

被引:9
|
作者
Mizuno, Takeo [1 ]
Doi, Hiroshi [1 ]
机构
[1] Inst Informat Secur, Yokohama, Kanagawa 2210835, Japan
关键词
proxy re-encryption; public key encryption; identity-based encryption; bilinear maps; IDENTITY-BASED ENCRYPTION;
D O I
10.1587/transfun.E94.A.36
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only two schemes which enables the conversion of IBE ciphertexts to PKE ciphertexts has been proposed. One of schemes has some drawbacks such that the size of the re-encrypted ciphertext increases and Bob must be aware of existence of the proxy, which means Bob cannot decrypt a re-encrypted ciphertext with same PKE decryption algorithm. The other one achieves security under Selective-ID model. We propose a new, efficient scheme that enables the conversion of IBE ciphertexts to PKE ciphertexts, and prove full-ID CPA security in the standard model. In our scheme, the size of the re-encrypted ciphertext is optimal and Bob should not aware of existence of the proxy. As far as we know, this is the first IBE-PKE type scheme that holds the above properties.
引用
收藏
页码:36 / 44
页数:9
相关论文
共 50 条
  • [1] Efficient IBE-PKE proxy re-encryption
    Mizuno, Takeo
    Doi, Hiroshi
    SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 285 - +
  • [2] Secure Proxy Re-Encryption from CBE to IBE
    CHEN Yan
    Wuhan University Journal of Natural Sciences, 2008, (06) : 657 - 661
  • [3] Efficient and Secure Certificateless Proxy Re-Encryption
    Liu, Ya
    Wang, Hongbing
    Wang, Chunlu
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (04): : 2254 - 2275
  • [4] Classical to Post-Quantum Secure ABE-IBE Proxy Re-Encryption Scheme
    Khan, Muhammad Nauman
    Rao, Asha
    Camtepe, Seyit
    Pieprzyk, Josef
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 85 - 98
  • [5] Proxy Re-encryption Scheme from IBE to CBE
    Wang, Xu An
    Yang, Xiaoyuan
    Zhang, Minqing
    FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS, 2009, : 99 - 102
  • [6] Hierarchical conditional proxy re-encryption
    Fang, Liming
    Susilo, Willy
    Ge, Chunpeng
    Wang, Jiandong
    COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 380 - 389
  • [7] Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
    Libert, Benoit
    Vergnaud, Damien
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (03) : 1786 - 1802
  • [8] Efficient Unidirectional Proxy Re-Encryption
    Chow, Sherman S. M.
    Weng, Jian
    Yang, Yanjiang
    Deng, Robert H.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 316 - +
  • [9] Efficient and Secure MPC Through Integration of FHE and Proxy Re-encryption
    Rohitkumar R. Upadhyay
    Sahadeo Padhye
    SN Computer Science, 6 (2)
  • [10] Secure Data Sharing in the Cloud Through Proxy Re-Encryption Technique
    Adilakshmi, Jyothi
    Rithika, Badgoian
    Pushpalatha, Chitikela
    Venkatesh, Thurpati
    Lohitha, Mandapati
    2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 700 - 705