• DocumentCode
    3026552
  • Title

    Proxy Re-encryption Scheme from IBE to CBE

  • Author

    Xuan Wang ; Yang, Xiaoyuan ; Zhang, Minqing

  • Author_Institution
    Key Lab. of Inf. & Network Security, Eng. Coll. of Chinese Armed Police Force, China
  • fYear
    2009
  • fDate
    25-26 April 2009
  • Firstpage
    99
  • Lastpage
    102
  • Abstract
    In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice´s public key into one that can be opened under Bob´s decryption key. They predicated that proxy re-encryption and re-signature will play an important role in our life. In 2007, Matsuo proposed the concept of four types of re-encryption schemes: CBE to IBE(type 1), IBE to IBE(type 2), IBE to CBE (type 3), CBE toCBE (type 4 ). Now CBE to IBE and IBE to IBE proxy re-encryption schemes are being standardized by IEEEP1363.3 working group. In this paper, based on we propose a proxy re-encryption scheme from IBE to CBE. To the best of our knowledge, this is the first type 3 scheme. We give the security model for proxy re-encryption scheme from IBE to CBE and prove our scheme´s security in this model without random oracle.
  • Keywords
    public key cryptography; Alice public key; Bob decryption key; CBE; IBE; IEEEP1363.3 working group; ciphertext; cryptographic primitive; proxy re-encryption scheme; proxy resignature; Data security; Databases; Educational institutions; Identity-based encryption; Information security; Laboratories; Public key; Public key cryptography; Standards Working Groups; proxy re-encryption;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Database Technology and Applications, 2009 First International Workshop on
  • Conference_Location
    Wuhan, Hubei
  • Print_ISBN
    978-0-7695-3604-0
  • Type

    conf

  • DOI
    10.1109/DBTA.2009.47
  • Filename
    5207804