Loading [a11y]/accessibility-menu.js
Proxy Re-encryption Scheme from IBE to CBE | IEEE Conference Publication | IEEE Xplore

Proxy Re-encryption Scheme from IBE to CBE


Abstract:

In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption. In proxy re-encryption, a proxy can transform a ciphertext com...Show More

Abstract:

In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice's public key into one that can be opened under Bob's decryption key. They predicated that proxy re-encryption and re-signature will play an important role in our life. In 2007, Matsuo proposed the concept of four types of re-encryption schemes: CBE to IBE(type 1), IBE to IBE(type 2), IBE to CBE (type 3), CBE toCBE (type 4 ). Now CBE to IBE and IBE to IBE proxy re-encryption schemes are being standardized by IEEEP1363.3 working group. In this paper, based on we propose a proxy re-encryption scheme from IBE to CBE. To the best of our knowledge, this is the first type 3 scheme. We give the security model for proxy re-encryption scheme from IBE to CBE and prove our scheme's security in this model without random oracle.
Date of Conference: 25-26 April 2009
Date Added to IEEE Xplore: 18 August 2009
Print ISBN:978-0-7695-3604-0

ISSN Information:

Conference Location: Wuhan, China

Contact IEEE to Subscribe

References

References is not available for this document.