By Topic

Fully Secure Identity Based Proxy Re-Encryption Schemes in the Standard Model

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$33 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

3 Author(s)
Xiaoming Hu ; Dept. of Comput. Sci. & Eng., Shanghai Jiao Tong Univ., Shanghai ; Xu Chen ; Shangteng Huang

A proxy re-encryption scheme allows the proxy to transform ciphertext computed under one public key into the different ciphertext that can be decrypted by using another public key. Recently, many identity-based proxy re-encryption schemes have been proposed. However, all of these schemes are only proved secure in the random oracle not in the standard model. In this paper, Based on Waters's identity based encryption, an identity based proxy re-encryption scheme is proposed that is proved fully secure without the random model. The proposed scheme's security can be reduced to the decision Bilinear Diffie-Hellman assumption.

Published in:

Computer Science and Information Technology, 2008. ICCSIT '08. International Conference on

Date of Conference:

Aug. 29 2008-Sept. 2 2008