Lattice Based Identity Based Proxy Re-Encryption Scheme

نویسندگان

  • Kunwar Singh
  • C. Pandu Rangan
  • A. K. Banerjee
چکیده

At Eurocrypt 1998, Blaze, Bleumer and Strauss (BBS) presented a new primitive called proxy reencryption. This new primitive allows semi trusted proxy to convert a ciphertext for Alice into a ciphertext for Bob without underlying message. Till now all the identity based proxy re-encryption schemes are based on the number theoretic assumptions like prime factorization, discrete logarithm problem etc. In this paper we propose a lattice based identity based proxy re-encryption scheme in the random oracle model for the single bit as well as for the multi-bit. Both of our schemes are anonymous, bidirectional and multi use. In these schemes, we have used Micciancio and Peikert’s strong trapdoor [20] and this strong trapdoor is shown to be very efficient [6].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare

Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). In a proxy re-encryption scheme, the delegator assigns a key to a proxy to re-encrypt all messages encrypted with his public key such that the re-encrypted ciphertexts can be decrypted with the delegatee’s private key. We propose a type-and-ident...

متن کامل

On the Role of PKG for Proxy Re-encryption in Identity Based Setting

In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption[3]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice’s public key into one that can be opened under Bob’s decryption key. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE(Certificate Based Public Key Encryption) to IBE(Id...

متن کامل

Collusion-Resistant Identity-based Proxy Re-encryption

An identity-based proxy re-encryption scheme allows the semi-trusted proxy to convert ciphertexts encrypted under Alice’s public identity into the ciphertexts encrypted under Bob’s public identity. The proxy cannot learn any information of the underlying message. As in other delegation schemes, identity-based proxy re-encryption scheme should be secure against collusion, especially of the proxy...

متن کامل

Identity-Based Proxy Re-encryption Without Random Oracles

In an identity-based proxy re-encryption scheme, a semi-trusted proxy can convert a ciphertext under Alice’s public identity into a ciphertext for Bob. The proxy does not know the secret key of Alice or Bob, and also does not know the plaintext during the conversion. In identity-based proxy re-encryption, the collusion of the proxy and a delegatee may result in the decryption of ciphertext for ...

متن کامل

Identity-Based Proxy Re-encryption

In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identity to another. Our schemes are compatible with curr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Internet Serv. Inf. Secur.

دوره 3  شماره 

صفحات  -

تاریخ انتشار 2013