Multi-use unidirectional identity-based proxy re-encryption from hierarchical identity-based encryption
نویسندگان
چکیده
Article history: Received 2 September 2010 Received in revised form 29 February 2012 Accepted 4 April 2012 Available online 17 April 2012
منابع مشابه
Chosen-ciphertext secure multi-hop identity-based conditional proxy re-encryption with constant-size ciphertexts
متن کامل
On the Role of PKG for Proxy Re-encryption in Identity Based Setting
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption[3]. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice’s public key into one that can be opened under Bob’s decryption key. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE(Certificate Based Public Key Encryption) to IBE(Id...
متن کاملLattice Based Identity Based Proxy Re-Encryption Scheme
At Eurocrypt 1998, Blaze, Bleumer and Strauss (BBS) presented a new primitive called proxy reencryption. This new primitive allows semi trusted proxy to convert a ciphertext for Alice into a ciphertext for Bob without underlying message. Till now all the identity based proxy re-encryption schemes are based on the number theoretic assumptions like prime factorization, discrete logarithm problem ...
متن کاملIdentity-Based Proxy Re-encryption
In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identity to another. Our schemes are compatible with curr...
متن کاملCollusion-Resistant Identity-based Proxy Re-encryption
An identity-based proxy re-encryption scheme allows the semi-trusted proxy to convert ciphertexts encrypted under Alice’s public identity into the ciphertexts encrypted under Bob’s public identity. The proxy cannot learn any information of the underlying message. As in other delegation schemes, identity-based proxy re-encryption scheme should be secure against collusion, especially of the proxy...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Inf. Sci.
دوره 206 شماره
صفحات -
تاریخ انتشار 2012