Proxy re-encryption systems for identity-based encryption

被引:0
|
作者
Matsuo, Toshihiko
机构
来源
关键词
proxy re-encryption system; public key encryption; identitybased encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice's public key into the different ciphertexts that can be decrypted by Bob's secret key. In this paper, we propose new proxy re-encryption systems; one for the transformation from ciphertexts encrypted under a traditional PKI-based public key into the ciphertexts that can be decrypted by an secret key for Identity-Based Encryption, and the other one for the transformation from ciphertexts encrypted in IBE manner into the different ciphertexts that can be decrypted by the other secret key for the IBE.
引用
收藏
页码:247 / 267
页数:21
相关论文
共 50 条
  • [1] Identity-based proxy re-encryption
    Green, Matthew
    Ateniese, Giuseppe
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 288 - +
  • [2] Identity-Based Conditional Proxy Re-Encryption
    Zhou Dehua
    Chen Kefei
    Liu Shengli
    Zheng Dong
    CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (01): : 61 - 66
  • [3] Identity-based Conditional Proxy Re-encryption
    Shao, Jun
    Wei, Guiyi
    Ling, Yun
    Xie, Mande
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [4] On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption
    Wan, Zhong-Mei
    Weng, Jian
    Lai, Xue-Jia
    Liu, Sheng-Li
    Li, Ji-Guo
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (01) : 243 - 259
  • [5] Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
    Wang, Xiaolei
    Wang, Yang
    Wang, Mingqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 535 - 544
  • [6] Key-Private Identity-Based Proxy Re-Encryption
    Ge, Chunpeng
    Xia, Jinyue
    Fang, Liming
    CMC-COMPUTERS MATERIALS & CONTINUA, 2020, 63 (02): : 633 - 647
  • [7] An identity-based proxy re-encryption for data deduplication in cloud
    Kan, Ge
    Jin, Chunhua
    Zhu, Huihui
    Xu, Yongliang
    Liu, Nian
    JOURNAL OF SYSTEMS ARCHITECTURE, 2021, 121
  • [8] Inter-domain Identity-Based Proxy Re-encryption
    Tang, Qiang
    Hartel, Pieter
    Jonker, Willem
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 332 - 347
  • [9] New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
    Lai, Jun-Zuo
    Zhu, Wen-Tao
    Deng, Robert H.
    Liu, Sheng-Li
    Kou, Wei-Dong
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2010, 25 (04) : 793 - 806
  • [10] Identity-based proxy re-encryption without random oracles
    Chu, Cheng-Kang
    Tzeng, Wen-Guey
    INFORMATION SECURITY, PROCEEDINGS, 2007, 4779 : 189 - +