Identity-based Conditional Proxy Re-encryption

被引:0
|
作者
Shao, Jun [1 ]
Wei, Guiyi [1 ]
Ling, Yun [1 ]
Xie, Mande [1 ]
机构
[1] Zhejiang Gongshang Univ, Coll Informat & Comp Engn, Hangzhou 310018, Peoples R China
关键词
Conditional Proxy Re-encryption; Identity-based; Encrypted Email Forwarding;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper proposes a new cryptographic primitive, named identity-based conditional proxy re-encryption (IBCPRE). In this primitive, a proxy with some information (a.k.a. re-encryption key) is allowed to transform a subset of ciphertexts under an identity to other ciphertexts under another identity. Due to the specific transformation, IBCPRE is very useful in encrypted email forwarding. Furthermore, we propose a concrete IBCPRE scheme based on Boneh-Franklin identity-based encryption. The proposed IBCPRE scheme is secure against the chosen ciphertext and identity attack in the random oracle model.
引用
收藏
页数:5
相关论文
共 50 条
  • [1] Identity-Based Conditional Proxy Re-Encryption
    Zhou Dehua
    Chen Kefei
    Liu Shengli
    Zheng Dong
    [J]. CHINESE JOURNAL OF ELECTRONICS, 2013, 22 (01) : 61 - 66
  • [2] Identity-based proxy re-encryption
    Green, Matthew
    Ateniese, Giuseppe
    [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PROCEEDINGS, 2007, 4521 : 288 - +
  • [3] On the security of two identity-based conditional proxy re-encryption schemes
    He, Kai
    Weng, Jian
    Deng, Robert H.
    Liu, Joseph K.
    [J]. THEORETICAL COMPUTER SCIENCE, 2016, 652 : 18 - 27
  • [4] Identity-based conditional proxy re-encryption with fine grain policy
    Ge, Chunpeng
    Susilo, Willy
    Wang, Jiandong
    Fang, Liming
    [J]. COMPUTER STANDARDS & INTERFACES, 2017, 52 : 1 - 9
  • [5] Identity-based Conditional Proxy Re-Encryption Without Random Oracles
    Qiu, JunJie
    Lee, YoungSil
    Lee, HoonJae
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC), 2014, : 349 - 353
  • [6] Proxy re-encryption systems for identity-based encryption
    Matsuo, Toshihiko
    [J]. Pairing-Based Cryptography - Pairing 2007, 2007, 4575 : 247 - 267
  • [7] On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption
    Wan, Zhong-Mei
    Weng, Jian
    Lai, Xue-Jia
    Liu, Sheng-Li
    Li, Ji-Guo
    [J]. JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (01) : 243 - 259
  • [8] Lattice-Based Revocable Identity-Based Proxy Re-encryption with Re-encryption Verifiability
    Wang, Xiaolei
    Wang, Yang
    Wang, Mingqiang
    [J]. WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS (WASA 2022), PT I, 2022, 13471 : 535 - 544
  • [9] Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email
    Xu, Peng
    Jiao, Tengfei
    Wu, Qianhong
    Wang, Wei
    Jin, Hai
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (01) : 66 - 79
  • [10] Efficient and Fully CCA Secure Conditional Proxy Re-Encryption from Hierarchical Identity-Based Encryption
    Liang, Kaitai
    Susilo, Willy
    Liu, Joseph K.
    Wong, Duncan S.
    [J]. Computer Journal, 2014, 58 (10): : 2778 - 2792