Proxy Re-encryption Scheme from IBE to CBE

被引:2
|
作者
Wang, Xu An
Yang, Xiaoyuan
Zhang, Minqing
机构
来源
FIRST INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS, PROCEEDINGS | 2009年
关键词
IDENTITY-BASED ENCRYPTION;
D O I
10.1109/DBTA.2009.47
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption [3]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice's public key into one that can be opened under Bob's decryption key. They predicated that proxy reencryption and re-signature will play an important role in our life. In 2007, Matsuo proposed the concept of four types of reencryption schemes: CBE to IBE(type 1), IBE to IBE(type 2), IBE to CBE (type 3), CBE to CBE (type 4) [17]. Now CBE to IBE and IBE to IBE proxy re-encryption schemes are being standardized by IEEEP1363.3 working group [18]. In this paper, based on [17] we propose a proxy re-encryption scheme from IBE to CBE. To the best of our knowledge, this is the first type 3 scheme. We give the security model for proxy re-encryption scheme from IBE to CBE and prove our scheme's security in this model without random oracle.
引用
收藏
页码:99 / 102
页数:4
相关论文
共 50 条
  • [41] A Blockchain-Based Proxy Re-Encryption With Equality Test for Vehicular Communication Systems
    Chen, Biwen
    He, Debiao
    Kumar, Neeraj
    Wang, Huaqun
    Choo, Kim-Kwang Raymond
    IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2021, 8 (03): : 2048 - 2059
  • [42] A scalable certificateless architecture for multicast wireless mesh network using proxy re-encryption
    Wang, Hongbing
    Cao, Zhenfu
    Wei, Lifei
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (01) : 14 - 32
  • [43] An authenticated re-encryption scheme for secure file transfer in named data networks
    Tseng, Yi-Fan
    Fan, Chun-I
    Cho, Yan-Fu
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2018, 31 (11)
  • [44] Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
    Xu, Peng
    Jiao, Tengfei
    Wu, Qianhong
    Wang, Wei
    Jin, Hai
    IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (01) : 66 - 79
  • [45] CCA-secure unidirectional proxy re-encryption in the adaptive corruption model without random oracles
    Weng Jian
    Chen MinRong
    Yang YanJiang
    Deng, Robert
    Chen Kefei
    Bao Feng
    SCIENCE CHINA-INFORMATION SCIENCES, 2010, 53 (03) : 593 - 606
  • [46] SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption
    Shao, Jun
    Cao, Zhenfu
    Lu, Peng
    SECURITY AND COMMUNICATION NETWORKS, 2011, 4 (02) : 122 - 135
  • [47] P2B: Privacy Preserving Identity-Based Broadcast Proxy Re-Encryption
    Maiti, Sumana
    Misra, Sudip
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (05) : 5610 - 5617
  • [48] Verifiable and hybrid attribute-based proxy re-encryption for flexible data sharing in cloud storage
    Sun, Lixue
    Xu, Chunxiang
    Zeng, Fugeng
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2024, 193
  • [49] Hierarchical Conditional Proxy Re-Encryption: A New Insight of Fine-Grained Secure Data Sharing
    He, Kai
    Liu, Xueqiao
    Yuan, Huaqiang
    Wei, Wenhong
    Liang, Kaitai
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2017, 2017, 10701 : 118 - 135
  • [50] Proxy re-encryption with equality test for secure data sharing in Internet of Things-based healthcare systems
    Li, Wenchao
    Jin, Chuanjie
    Kumari, Saru
    Xiong, Hu
    Kumar, Sachin
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2022, 33 (10)