Proxy Re-encryption Scheme from IBE to CBE

被引:2
|
作者
Wang, Xu An
Yang, Xiaoyuan
Zhang, Minqing
机构
来源
FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS | 2009年
关键词
IDENTITY-BASED ENCRYPTION;
D O I
10.1109/DBTA.2009.47
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption [3]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice's public key into one that can be opened under Bob's decryption key. They predicated that proxy reencryption and re-signature will play an important role in our life. In 2007, Matsuo proposed the concept of four types of reencryption schemes: CBE to IBE(type 1), IBE to IBE(type 2), IBE to CBE (type 3), CBE to CBE (type 4) [17]. Now CBE to IBE and IBE to IBE proxy re-encryption schemes are being standardized by IEEEP1363.3 working group [18]. In this paper, based on [17] we propose a proxy re-encryption scheme from IBE to CBE. To the best of our knowledge, this is the first type 3 scheme. We give the security model for proxy re-encryption scheme from IBE to CBE and prove our scheme's security in this model without random oracle.
引用
收藏
页码:99 / 102
页数:4
相关论文
共 50 条
  • [21] Proxy re-encryption with plaintext checkable encryption for integrating digital twins into IIoT
    Hadabi, Abdalla
    Qu, Zheng
    Elhabob, Rashad
    Kumar, Sachin
    Yeh, Kuo-Hui
    Kumari, Saru
    Xiong, Hu
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 116
  • [22] Anonymous Conditional Proxy Re-encryption without Random Oracle
    Fang, Liming
    Susilo, Willy
    Wang, Jiandong
    PROVABLE SECURITY, PROCEEDINGS, 2009, 5848 : 47 - +
  • [23] Achieving Flexibility for ABE with Outsourcing via Proxy Re-Encryption
    Yu, Zuoxia
    Au, Man Ho
    Yang, Rupeng
    Lai, Junzuo
    Xu, Qiuliang
    PROCEEDINGS OF THE 2018 ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (ASIACCS'18), 2018, : 659 - 672
  • [24] Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption
    Libert, Benoit
    Vergnaud, Damien
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (03) : 1786 - 1802
  • [25] Secure Data Sharing in the Cloud Through Proxy Re-Encryption Technique
    Adilakshmi, Jyothi
    Rithika, Badgoian
    Pushpalatha, Chitikela
    Venkatesh, Thurpati
    Lohitha, Mandapati
    2024 4TH INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND SOCIAL NETWORKING, ICPCSN 2024, 2024, : 700 - 705
  • [26] On the application of generic CCA-secure transformations to proxy re-encryption
    Nunez, David
    Agudo, Isaac
    Lopez, Javier
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (12) : 1769 - 1785
  • [27] A Timed-Release Proxy Re-encryption Scheme and Its Application to Fairly-Opened Multicast Communication
    Emura, Keita
    Miyaji, Atsuko
    Omote, Kazumasa
    PROVABLE SECURITY, 2010, 6402 : 200 - +
  • [28] Identity-based proxy re-encryption without random oracles
    Chu, Cheng-Kang
    Tzeng, Wen-Guey
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 189 - +
  • [29] Identity-based multi-condition proxy re-encryption
    Wang, Pingshu
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN MECHANICAL ENGINEERING AND INDUSTRIAL INFORMATICS (AMEII 2016), 2016, 73 : 1047 - 1052
  • [30] Multi-Keyword Searchable Identity-Based Proxy Re-Encryption from Lattices
    Zhuang, Er-Shuo
    Fan, Chun-, I
    MATHEMATICS, 2023, 11 (18)