Proxy Re-encryption Systems for Identity-Based Encryption

نویسنده

  • Toshihiko Matsuo
چکیده

A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice’s public key into the different ciphertexts that can be decrypted by Bob’s secret key. In this paper, we propose new proxy re-encryption systems; one for the transformation from ciphertexts encrypted under a traditional certificate-based public key into the ciphertexts that can be decrypted by an secret key for Identity-Based Encryption, and the other one for the transformation from ciphertexts encrypted in IBE manner into the different ciphertexts that can be decrypted by the other secret key for the IBE.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On the Role of PKG for Proxy Re-encryption in Identity Based Setting

In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption[3]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice’s public key into one that can be opened under Bob’s decryption key. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE(Certificate Based Public Key Encryption) to IBE(Id...

متن کامل

On the Relation between Identity-Based Proxy Re-Encryption and Mediated Identity-Based Encryption

ZHONG-MEI WAN, JIAN WENG, XUE-JIA LAI, SHENG-LI LIU AND JI-GUO LI Department of Computer Science and Engineering Shanghai Jiao Tong University Shanghai 200240, P.R. China College of Science Department of Computer Science Hohai University Nanjing 210098, P.R. China E-mail: [email protected] Department of Computer Science Jinan University Guangzhou 510630, P.R. China School of Information System...

متن کامل

A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare

Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). In a proxy re-encryption scheme, the delegator assigns a key to a proxy to re-encrypt all messages encrypted with his public key such that the re-encrypted ciphertexts can be decrypted with the delegatee’s private key. We propose a type-and-ident...

متن کامل

Identity-Based Proxy Re-encryption

In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identity to another. Our schemes are compatible with curr...

متن کامل

Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption

Article history: Received 2 September 2010 Received in revised form 29 February 2012 Accepted 4 April 2012 Available online 17 April 2012

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007