Identity-based proxy re-encryption without random oracles

被引:0
|
作者
Chu, Cheng-Kang [1 ]
Tzeng, Wen-Guey [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
来源
关键词
proxy re-encryption; identity-based encryption; standard model;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a ciphertext for Alice into the ciphertext for Bob. In this paper, we propose two identity-based proxy re-encryption schemes, which are both proved secure in the standard model. The first one is efficient in both computation and ciphertext length, and the other one achieves chosen-ciphertext security. Our solutions answer the open problems left in the previous work.
引用
收藏
页码:189 / +
页数:3
相关论文
共 50 条
  • [1] HIERARCHICAL IDENTITY-BASED PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES
    Ren, Yanli
    Gu, Dawu
    Wang, Shuozhong
    Zhang, Xinpengu
    INTERNATIONAL JOURNAL OF FOUNDATIONS OF COMPUTER SCIENCE, 2010, 21 (06) : 1049 - 1063
  • [2] Identity-based Conditional Proxy Re-Encryption Without Random Oracles
    Qiu, JunJie
    Lee, YoungSil
    Lee, HoonJae
    2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 349 - 353
  • [3] Collusion-Resistant Identity-Based Proxy Re-Encryption Without Random Oracles
    Qiu, JunJie
    Jo, JungBok
    Lee, HoonJae
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (09): : 337 - 344
  • [4] Collusion-resistant identity-based proxy re-encryption without random oracles
    Department of Ubiquitous IT, Graduate School of Dongseo University, Busan, Korea, Republic of
    不详
    Int. J. Secur. Appl., 9 (337-344):
  • [5] Identity-based proxy re-encryption
    Green, Matthew
    Ateniese, Giuseppe
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 288 - +
  • [6] Proxy re-encryption systems for identity-based encryption
    Matsuo, Toshihiko
    Pairing-Based Cryptography - Pairing 2007, 2007, 4575 : 247 - 267
  • [7] Identity-Based Conditional Proxy Re-Encryption
    Zhou Dehua
    Chen Kefei
    Liu Shengli
    Zheng Dong
    CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (01): : 61 - 66
  • [8] Identity-based Conditional Proxy Re-encryption
    Shao, Jun
    Wei, Guiyi
    Ling, Yun
    Xie, Mande
    2011 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2011,
  • [9] On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption
    Wan, Zhong-Mei
    Weng, Jian
    Lai, Xue-Jia
    Liu, Sheng-Li
    Li, Ji-Guo
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (01) : 243 - 259
  • [10] Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
    Wang, Xiaolei
    Wang, Yang
    Wang, Mingqiang
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 535 - 544