Proxy Re-encryption Scheme from IBE to CBE

被引:2
|
作者
Wang, Xu An
Yang, Xiaoyuan
Zhang, Minqing
机构
来源
FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS | 2009年
关键词
IDENTITY-BASED ENCRYPTION;
D O I
10.1109/DBTA.2009.47
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption [3]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice's public key into one that can be opened under Bob's decryption key. They predicated that proxy reencryption and re-signature will play an important role in our life. In 2007, Matsuo proposed the concept of four types of reencryption schemes: CBE to IBE(type 1), IBE to IBE(type 2), IBE to CBE (type 3), CBE to CBE (type 4) [17]. Now CBE to IBE and IBE to IBE proxy re-encryption schemes are being standardized by IEEEP1363.3 working group [18]. In this paper, based on [17] we propose a proxy re-encryption scheme from IBE to CBE. To the best of our knowledge, this is the first type 3 scheme. We give the security model for proxy re-encryption scheme from IBE to CBE and prove our scheme's security in this model without random oracle.
引用
收藏
页码:99 / 102
页数:4
相关论文
共 50 条
  • [31] A Pre-Authentication Approach to Proxy Re-Encryption in Big Data Context
    Wang, Kun
    Yu, Jiahui
    Liu, Xiulong
    Guo, Song
    IEEE TRANSACTIONS ON BIG DATA, 2021, 7 (04) : 657 - 667
  • [32] Proxy Re-Encryption Conjunctive Keyword Search against Keyword Guessing Attack
    Yang, Yang
    Ma, Maode
    Lin, Bogang
    2013 COMPUTING, COMMUNICATIONS AND IT APPLICATIONS CONFERENCE (COMCOMAP), 2013, : 125 - 130
  • [33] Controlled secure social cloud data sharing based on a novel identity based proxy re-encryption plus scheme
    Wang, Xu An
    Xhafa, Fatos
    Ma, Jianfeng
    Zheng, Zhiheng
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2019, 130 : 153 - 165
  • [34] HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
    Ren, Yanli
    Gu, Dawu
    Wang, Shuozhong
    Zhang, Xinpengu
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2010, 21 (06) : 1049 - 1063
  • [35] CBP: Coalitional-Game-Based Broadcast Proxy Re-Encryption in IoT
    Maiti, Sumana
    Misra, Sudip
    Mondal, Ayan
    IEEE INTERNET OF THINGS JOURNAL, 2023, 10 (17) : 15642 - 15651
  • [36] A Secure Re-Encryption Scheme for Data Sharing in Unreliable Cloud Environment
    Sultan, Nazatul Haque
    Barbhuiya, Ferdous Ahmed
    PROCEEDINGS 2016 IEEE WORLD CONGRESS ON SERVICES - SERVICES 2016, 2016, : 75 - 80
  • [37] A Novel Revocable and Identity-Based Conditional Proxy Re-Encryption Scheme With Ciphertext Evolution for Secure Cloud Data Sharing
    Yao, Shimao
    Dayot, Ralph Voltaire J.
    Kim, Hyung-Jin
    Ra, In-Ho
    IEEE ACCESS, 2021, 9 : 42801 - 42816
  • [38] Multi-use and unidirectional identity-based proxy re-encryption schemes
    Wang, Hongbing
    Cao, Zhenfu
    Wang, Licheng
    INFORMATION SCIENCES, 2010, 180 (20) : 4042 - 4059
  • [39] Burn After Reading: Adaptively Secure Puncturable Identity-Based Proxy Re-Encryption Scheme for Securing Group Message
    Xiong, Hu
    Wang, Lili
    Zhou, Zhida
    Zhao, Zetong
    Huang, Xin
    Kumari, Saru
    IEEE INTERNET OF THINGS JOURNAL, 2022, 9 (13) : 11248 - 11260
  • [40] ABP: Attribute-Based Broadcast Proxy Re-Encryption With Coalitional Game Theory
    Maiti, Sumana
    Misra, Sudip
    Mondal, Ayan
    IEEE SYSTEMS JOURNAL, 2024, 18 (01): : 85 - 95