Identity-based proxy re-encryption without random oracles

被引:0
|
作者
Chu, Cheng-Kang [1 ]
Tzeng, Wen-Guey [1 ]
机构
[1] Natl Chiao Tung Univ, Dept Comp Sci, Hsinchu 300, Taiwan
来源
关键词
proxy re-encryption; identity-based encryption; standard model;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a ciphertext for Alice into the ciphertext for Bob. In this paper, we propose two identity-based proxy re-encryption schemes, which are both proved secure in the standard model. The first one is efficient in both computation and ciphertext length, and the other one achieves chosen-ciphertext security. Our solutions answer the open problems left in the previous work.
引用
收藏
页码:189 / +
页数:3
相关论文
共 50 条
  • [21] A Key-Policy Attribute-Based Proxy Re-Encryption Without Random Oracles
    Ge, Chunpeng
    Susilo, Willy
    Wang, Jiandong
    Huang, Zhiqiu
    Fang, Liming
    Ren, Yongjun
    COMPUTER JOURNAL, 2016, 59 (07): : 970 - 982
  • [22] Identity-Based Proxy Re-encryption Based on SM9
    Liu, Hang
    Ming, Yang
    Wang, Chenhao
    Zhao, Yi
    INFORMATION SECURITY AND CRYPTOLOGY, INSCRYPT 2023, PT I, 2024, 14526 : 320 - 339
  • [23] Efficient Selective Identity-Based Encryption Without Random Oracles
    Boneh, Dan
    Boyen, Xavier
    JOURNAL OF CRYPTOLOGY, 2011, 24 (04) : 659 - 693
  • [24] Efficient Identity-based Broadcast Encryption without Random Oracles
    Hu, Liang
    Liu, Zheli
    Cheng, Xiaochun
    JOURNAL OF COMPUTERS, 2010, 5 (03) : 331 - 336
  • [25] Anonymous hierarchical identity-based encryption (Without random oracles)
    Boyen, Xavier
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - CRYPTO 2006, PROCEEDINGS, 2006, 4117 : 290 - 307
  • [26] Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
    Shao, Jun
    Cao, Zhenfu
    INFORMATION SCIENCES, 2012, 206 : 83 - 95
  • [27] Efficient Selective Identity-Based Encryption Without Random Oracles
    Dan Boneh
    Xavier Boyen
    Journal of Cryptology, 2011, 24 : 659 - 693
  • [28] Identity-based conditional proxy re-encryption with fine grain policy
    Ge, Chunpeng
    Susilo, Willy
    Wang, Jiandong
    Fang, Liming
    COMPUTER STANDARDS & INTERFACES, 2017, 52 : 1 - 9
  • [29] On the security of two identity-based conditional proxy re-encryption schemes
    He, Kai
    Weng, Jian
    Deng, Robert H.
    Liu, Joseph K.
    THEORETICAL COMPUTER SCIENCE, 2016, 652 : 18 - 27
  • [30] Efficient Identity-based Proxy Re-encryption on Lattice in the Standard Model
    Jiang Mingming
    Guo Yuyan
    Yu Lei
    Song Wangan
    Wei Shimin
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (01) : 61 - 66