Title :
Proxy Re-encryption Scheme from IBE to CBE
Author :
Xuan Wang ; Yang, Xiaoyuan ; Zhang, Minqing
Author_Institution :
Key Lab. of Inf. & Network Security, Eng. Coll. of Chinese Armed Police Force, China
Abstract :
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice´s public key into one that can be opened under Bob´s decryption key. They predicated that proxy re-encryption and re-signature will play an important role in our life. In 2007, Matsuo proposed the concept of four types of re-encryption schemes: CBE to IBE(type 1), IBE to IBE(type 2), IBE to CBE (type 3), CBE toCBE (type 4 ). Now CBE to IBE and IBE to IBE proxy re-encryption schemes are being standardized by IEEEP1363.3 working group. In this paper, based on we propose a proxy re-encryption scheme from IBE to CBE. To the best of our knowledge, this is the first type 3 scheme. We give the security model for proxy re-encryption scheme from IBE to CBE and prove our scheme´s security in this model without random oracle.
Keywords :
public key cryptography; Alice public key; Bob decryption key; CBE; IBE; IEEEP1363.3 working group; ciphertext; cryptographic primitive; proxy re-encryption scheme; proxy resignature; Data security; Databases; Educational institutions; Identity-based encryption; Information security; Laboratories; Public key; Public key cryptography; Standards Working Groups; proxy re-encryption;
Conference_Titel :
Database Technology and Applications, 2009 First International Workshop on
Conference_Location :
Wuhan, Hubei
Print_ISBN :
978-0-7695-3604-0
DOI :
10.1109/DBTA.2009.47