Proxy re-encryption systems for identity-based encryption

被引:0
|
作者
Matsuo, Toshihiko
机构
来源
关键词
proxy re-encryption system; public key encryption; identitybased encryption;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice's public key into the different ciphertexts that can be decrypted by Bob's secret key. In this paper, we propose new proxy re-encryption systems; one for the transformation from ciphertexts encrypted under a traditional PKI-based public key into the ciphertexts that can be decrypted by an secret key for Identity-Based Encryption, and the other one for the transformation from ciphertexts encrypted in IBE manner into the different ciphertexts that can be decrypted by the other secret key for the IBE.
引用
收藏
页码:247 / 267
页数:21
相关论文
共 50 条
  • [31] Revocable Identity-Based Broadcast Proxy Re-Encryption for Data Sharing in Clouds
    Ge, Chunpeng
    Liu, Zhe
    Xia, Jinyue
    Fang, Liming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2021, 18 (03) : 1214 - 1226
  • [32] Multi-use and unidirectional identity-based proxy re-encryption schemes
    Wang, Hongbing
    Cao, Zhenfu
    Wang, Licheng
    INFORMATION SCIENCES, 2010, 180 (20) : 4042 - 4059
  • [33] Identity-Based Broadcast Proxy Re-Encryption for Flexible Data Sharing in VANETs
    Zhang, Jing
    Su, Shuangshuang
    Zhong, Hong
    Cui, Jie
    He, Debiao
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2023, 18 : 4830 - 4842
  • [34] Further improvement of a dynamic type and identity-based proxy re-encryption scheme
    Zhang X.-P.
    Xu C.-X.
    Zhang X.-J.
    Deng J.
    Huang X.
    1600, Univ. of Electronic Science and Technology of China (45): : 964 - 968
  • [35] Proxy Re-Encryption Based on Homomorphic Encryption
    Bellafqira, Reda
    Coatrieux, Gouenou
    Bouslimi, Dalel
    Quellec, Gwenole
    Cozic, Michel
    33RD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2017), 2017, : 154 - 161
  • [36] An Improved Cloud-Based Revocable Identity-Based Proxy Re-encryption Scheme
    Wang, Changji
    Fang, Jian
    Li, Yuan
    APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 14 - 26
  • [37] Security of Cloud-Based Revocable Identity-Based Proxy Re-Encryption Scheme
    Park, Seunghwan
    Lee, Dong Hoon
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2016, E99D (07): : 1933 - 1936
  • [38] On the Insecurity of an Identity Based Proxy Re-encryption Scheme
    Wang, Xu An
    Yang, Xiaoyuan
    FUNDAMENTA INFORMATICAE, 2010, 98 (2-3) : 277 - 281
  • [39] Identity Based Broadcast Encryption Based on One to Many Identity Based Proxy Re-encryption
    Wang, Xu An
    Yang, Xiaoyuan
    2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 1, 2009, : 47 - 50
  • [40] Collusion-Resistant Identity-Based Proxy Re-Encryption Without Random Oracles
    Qiu, JunJie
    Jo, JungBok
    Lee, HoonJae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 337 - 344