DocumentCode :
1825543
Title :
Proxy Re-encryption Scheme Based on SK Identity Based Encryption
Author :
Wang, Xu An ; Yang, Xiaoyuan
Author_Institution :
Key Lab. of Inf. & Network Security, Eng. Coll. of Chinese Armed Police Force, Xi´´an, China
Volume :
2
fYear :
2009
fDate :
18-20 Aug. 2009
Firstpage :
657
Lastpage :
660
Abstract :
The concept of proxy re-cryptography comes from the work of Blaze, Bleumer, and Strauss in 1998. The goal of proxy re-encryption is to securely enable the re-encryption of ciphertexts from one key to another, without relying on trusted parties. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE to CBE, IBE to CBE, CBE to IBE and IBE to IBE. Now CBE to IBE and IBE to IBE proxy re-encryption schemes are being standardized by IEEEP1363.3 working group. One feature of their schemes is that they are all based on BB1 identity based encryption. We reconsider the problem of constructing proxy re-encryption based on SK identity based encryption. Surprisingly, if we consider the help of PKG, then it is easy to construct proxy re-encryption based on SK identity based encryption. Interestingly , our proxy re-encryption scheme even can achieve CCA2 secure, which makes it is unique.
Keywords :
cryptography; CBE-CBE; CBE-IBE; IBE-CBE; IBE-IBE; IEEEP1363.3 working group; SK identity based encryption; ciphertext reencryption; proxy reencryption scheme; Cryptography; Educational institutions; Government; Hydrogen; Identity-based encryption; Information security; Laboratories; Large-scale systems;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Information Assurance and Security, 2009. IAS '09. Fifth International Conference on
Conference_Location :
Xi´an
Print_ISBN :
978-0-7695-3744-3
Type :
conf
DOI :
10.1109/IAS.2009.191
Filename :
5284228
Link To Document :
بازگشت