Proxy re-encryption systems for identity-based encryption

被引:0
|
作者
Matsuo, Toshihiko
机构
来源
关键词
proxy re-encryption system; public key encryption; identitybased encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice's public key into the different ciphertexts that can be decrypted by Bob's secret key. In this paper, we propose new proxy re-encryption systems; one for the transformation from ciphertexts encrypted under a traditional PKI-based public key into the ciphertexts that can be decrypted by an secret key for Identity-Based Encryption, and the other one for the transformation from ciphertexts encrypted in IBE manner into the different ciphertexts that can be decrypted by the other secret key for the IBE.
引用
收藏
页码:247 / 267
页数:21
相关论文
共 50 条
  • [21] Identity-based Conditional Proxy Re-Encryption Without Random Oracles
    Qiu, JunJie
    Lee, YoungSil
    Lee, HoonJae
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 349 - 353
  • [22] Proxy Re-encryption Scheme Based on SK Identity Based Encryption
    Wang, Xu An
    Yang, Xiaoyuan
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 657 - 660
  • [23] Identity-based universal re-encryption for mixnets
    Yajam, Habib Allah
    Mohajeri, Javad
    Salmasizadeh, Mahmoud
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 2992 - 3001
  • [24] IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability
    Wu Li-qiang
    Yang Xiao-yuan
    Zhang Min-qing
    Wang Xu-an
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 13 (01) : 469 - 482
  • [25] IB-VPRE: adaptively secure identity-based proxy re-encryption scheme from LWE with re-encryption verifiability
    Wu Li-qiang
    Yang Xiao-yuan
    Zhang Min-qing
    Wang Xu-an
    Journal of Ambient Intelligence and Humanized Computing, 2022, 13 (1) : 469 - 482
  • [26] Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption
    Liang, Kaitai
    Susilo, Willy
    Liu, Joseph K.
    Wong, Duncan S.
    Computer Journal, 2014, 58 (10): : 2778 - 2792
  • [27] Identity-Based Proxy Re-encryption over NTRU Lattices for Cloud Computing
    Yue, Na
    Wang, Yang
    Wang, Mingqiang
    2020 INTERNATIONAL CONFERENCE ON IDENTIFICATION, INFORMATION AND KNOWLEDGE IN THE INTERNET OF THINGS (IIKI2020), 2021, 187 : 264 - 269
  • [28] A Secure Revocable Identity-Based Proxy Re-encryption Scheme for Cloud Storage
    Luo, Wei
    Ma, Wenping
    CLOUD COMPUTING AND SECURITY, PT II, 2018, 11064 : 519 - 530
  • [29] New Identity-Based Proxy Re-encryption Schemes to Prevent Collusion Attacks
    Wang, Lihua
    Wang, Licheng
    Mambo, Masahiro
    Okamoto, Eiji
    PAIRING-BASED CRYPTOGRAPHY-PAIRING 2010, 2010, 6487 : 327 - +
  • [30] Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption
    Liang, Kaitai
    Susilo, Willy
    Liu, Joseph K.
    Wong, Duncan S.
    COMPUTER JOURNAL, 2015, 58 (10): : 2778 - 2792