Secure and Efficient IBE-PKE Proxy Re-Encryption

被引:9
作者
Mizuno, Takeo [1 ]
Doi, Hiroshi [1 ]
机构
[1] Inst Informat Secur, Yokohama, Kanagawa 2210835, Japan
关键词
proxy re-encryption; public key encryption; identity-based encryption; bilinear maps; IDENTITY-BASED ENCRYPTION;
D O I
10.1587/transfun.E94.A.36
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only two schemes which enables the conversion of IBE ciphertexts to PKE ciphertexts has been proposed. One of schemes has some drawbacks such that the size of the re-encrypted ciphertext increases and Bob must be aware of existence of the proxy, which means Bob cannot decrypt a re-encrypted ciphertext with same PKE decryption algorithm. The other one achieves security under Selective-ID model. We propose a new, efficient scheme that enables the conversion of IBE ciphertexts to PKE ciphertexts, and prove full-ID CPA security in the standard model. In our scheme, the size of the re-encrypted ciphertext is optimal and Bob should not aware of existence of the proxy. As far as we know, this is the first IBE-PKE type scheme that holds the above properties.
引用
收藏
页码:36 / 44
页数:9
相关论文
共 50 条
  • [21] Proxy re-encryption systems for identity-based encryption
    Matsuo, Toshihiko
    Pairing-Based Cryptography - Pairing 2007, 2007, 4575 : 247 - 267
  • [22] Certificateless Proxy Re-Encryption Without Pairings
    Yang, Kang
    Xu, Jing
    Zhang, Zhenfeng
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 67 - 88
  • [23] Efficient Key-Aggregate Proxy Re-Encryption for Secure Data Sharing in Clouds
    Chen, Wei-Hao
    Fan, Chun-I
    Tseng, Yi-Fan
    2018 IEEE CONFERENCE ON DEPENDABLE AND SECURE COMPUTING (DSC), 2018, : 70 - 73
  • [24] SEMPRE: SECURE MULTICAST ARCHITECTURE USING PROXY RE-ENCRYPTION
    Chiu, Yun-Peng
    Huang, Chun-Ying
    Lei, Chin-Laung
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2012, 8 (7A): : 4719 - 4748
  • [25] Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption
    Yu, Zuoxia
    Au, Man Ho
    Yang, Rupeng
    Lai, Junzuo
    Xu, Qiuliang
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 659 - 672
  • [26] Unidirectional chosen-ciphertext secure proxy re-encryption
    Libert, Benoit
    Vergnaud, Damien
    PUBLIC KEY CRYPTOGRAPHY - PKC 2008, 2008, 4939 : 360 - +
  • [27] Secure Multicast using Proxy Re-Encryption in an IoT Environment
    Kim, SuHyun
    Hwang, YongWoon
    Seo, JungTaek
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2018, 12 (02): : 946 - 959
  • [28] Secure Multicast Using Proxy Re-encryption in IoT Environment
    Kim, SuHyun
    Lee, ImYeong
    ADVANCES IN COMPUTER SCIENCE AND UBIQUITOUS COMPUTING, 2018, 474 : 66 - 70
  • [29] Efficient proxy re-encryption with keyword search scheme
    Guo, Lifeng
    Lu, Bo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2014, 51 (06): : 1221 - 1228
  • [30] Improved Proxy Re-encryption Scheme with Equality Test
    Yang, Chih-Chen
    Tso, Raylin
    Liu, Zi-Yuan
    Hsu, Jen-Chieh
    Tseng, Yi-Fan
    2021 16TH ASIA JOINT CONFERENCE ON INFORMATION SECURITY (ASIAJCIS 2021), 2021, : 37 - 44