Title :
Improved ID-Based Proxy Re-signcryption Scheme
Author :
Rawat, S.S. ; Shrivastava, G.K.
Author_Institution :
RKDF Inst. of Sci. & Technol., Bhopal, India
Abstract :
An identity-based proxy re-signcryption scheme proposed by Wang Huige[9], is a cryptographic technique which provides both confidentiality and authenticity. It is a dual signcryption technique. First, signcryption is done by originator of data and another signcryption performed by semi-trusted entity called âproxyâ to convert signcryption addressed to a âdelegatorâ (i.e., de-signcryptor) to those that can be de-signcrypted by a âdelegateeâ (i.e., de-re-signcryptor), by using special information given by the delegator, called the ârekeyâ. In this paper, we have proposed an improved identity based proxy re-signcryption scheme which improve the performance of scheme proposed by Wang Huige. In our scheme, we have designed and simulated the scheme proposed by Wang Huige using different secure hash functions such as MD5, SHA-1, or SHA-256, separately. Analyzing the scheme so that it gives the high performance.
Keywords :
cryptography; ID based proxy resigncryption scheme; Wang Huige; ârekeyâ; cryptographic technique; hash functions; signcryption technique; Algorithm design and analysis; Elliptic curve cryptography; Encryption; Finite element methods; ID-based cryptosystem; bilinear map; etc; random oracle model; re-signcryption; signcryption;
Conference_Titel :
Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on
Conference_Location :
Mathura
Print_ISBN :
978-1-4673-2981-1
DOI :
10.1109/CICN.2012.133