Lattice Based Identity Based Proxy Re-Encryption Scheme
نویسندگان
چکیده
At Eurocrypt 1998, Blaze, Bleumer and Strauss (BBS) presented a new primitive called proxy reencryption. This new primitive allows semi trusted proxy to convert a ciphertext for Alice into a ciphertext for Bob without underlying message. Till now all the identity based proxy re-encryption schemes are based on the number theoretic assumptions like prime factorization, discrete logarithm problem etc. In this paper we propose a lattice based identity based proxy re-encryption scheme in the random oracle model for the single bit as well as for the multi-bit. Both of our schemes are anonymous, bidirectional and multi use. In these schemes, we have used Micciancio and Peikert’s strong trapdoor [20] and this strong trapdoor is shown to be very efficient [6].
منابع مشابه
A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). In a proxy re-encryption scheme, the delegator assigns a key to a proxy to re-encrypt all messages encrypted with his public key such that the re-encrypted ciphertexts can be decrypted with the delegatee’s private key. We propose a type-and-ident...
متن کاملOn the Role of PKG for Proxy Re-encryption in Identity Based Setting
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption[3]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice’s public key into one that can be opened under Bob’s decryption key. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE(Certificate Based Public Key Encryption) to IBE(Id...
متن کاملCollusion-Resistant Identity-based Proxy Re-encryption
An identity-based proxy re-encryption scheme allows the semi-trusted proxy to convert ciphertexts encrypted under Alice’s public identity into the ciphertexts encrypted under Bob’s public identity. The proxy cannot learn any information of the underlying message. As in other delegation schemes, identity-based proxy re-encryption scheme should be secure against collusion, especially of the proxy...
متن کاملIdentity-Based Proxy Re-encryption Without Random Oracles
In an identity-based proxy re-encryption scheme, a semi-trusted proxy can convert a ciphertext under Alice’s public identity into a ciphertext for Bob. The proxy does not know the secret key of Alice or Bob, and also does not know the plaintext during the conversion. In identity-based proxy re-encryption, the collusion of the proxy and a delegatee may result in the decryption of ciphertext for ...
متن کاملIdentity-Based Proxy Re-encryption
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identity to another. Our schemes are compatible with curr...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Internet Serv. Inf. Secur.
دوره 3 شماره
صفحات -
تاریخ انتشار 2013