Secure and Efficient IBE-PKE Proxy Re-Encryption

被引:9
作者
Mizuno, Takeo [1 ]
Doi, Hiroshi [1 ]
机构
[1] Inst Informat Secur, Yokohama, Kanagawa 2210835, Japan
关键词
proxy re-encryption; public key encryption; identity-based encryption; bilinear maps; IDENTITY-BASED ENCRYPTION;
D O I
10.1587/transfun.E94.A.36
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only two schemes which enables the conversion of IBE ciphertexts to PKE ciphertexts has been proposed. One of schemes has some drawbacks such that the size of the re-encrypted ciphertext increases and Bob must be aware of existence of the proxy, which means Bob cannot decrypt a re-encrypted ciphertext with same PKE decryption algorithm. The other one achieves security under Selective-ID model. We propose a new, efficient scheme that enables the conversion of IBE ciphertexts to PKE ciphertexts, and prove full-ID CPA security in the standard model. In our scheme, the size of the re-encrypted ciphertext is optimal and Bob should not aware of existence of the proxy. As far as we know, this is the first IBE-PKE type scheme that holds the above properties.
引用
收藏
页码:36 / 44
页数:9
相关论文
共 50 条
  • [41] An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing
    Selvi, S. Sharmila Deva
    Paul, Arinjita
    Rangan, Chandrasekaran Pandu
    [J]. PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 413 - 433
  • [42] Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption
    Hayashi, Ryotaro
    Matsushita, Tatsuyuki
    Yoshida, Takuya
    Fujii, Yoshihiro
    Okada, Koji
    [J]. ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2011, 7038 : 210 - +
  • [43] Proxy re-encryption with plaintext checkable encryption for integrating digital twins into IIoT
    Hadabi, Abdalla
    Qu, Zheng
    Elhabob, Rashad
    Kumar, Sachin
    Yeh, Kuo-Hui
    Kumari, Saru
    Xiong, Hu
    [J]. COMPUTERS & ELECTRICAL ENGINEERING, 2024, 116
  • [44] Anonymous Conditional Proxy Re-encryption without Random Oracle
    Fang, Liming
    Susilo, Willy
    Wang, Jiandong
    [J]. PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 47 - +
  • [45] A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption
    Guijiang Liu
    Haibo Xie
    Wenming Wang
    Haiping Huang
    [J]. Journal of Cloud Computing, 13
  • [46] Fuzzy conditional proxy re-encryption
    Fang LiMing
    Wang JianDong
    Ge ChunPeng
    Ren YongJun
    [J]. SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) : 1 - 13
  • [47] More efficient CCA-secure unidirectional proxy re-encryption schemes without random oracles
    Wang, Hongbing
    Cao, Zhenfu
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2013, 6 (02) : 173 - 181
  • [48] A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption
    Liu, Guijiang
    Xie, Haibo
    Wang, Wenming
    Huang, Haiping
    [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2024, 13 (01):
  • [49] Proxy Re-encryption from Lattices
    Kirshanova, Elena
    [J]. PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 77 - 94
  • [50] Fuzzy conditional proxy re-encryption
    FANG LiMing
    WANG JianDong
    GE ChunPeng
    REN YongJun
    [J]. Science China(Information Sciences), 2013, 56 (05) : 211 - 223