DocumentCode
2431806
Title
Improved ID-Based Proxy Re-signcryption Scheme
Author
Rawat, S.S. ; Shrivastava, G.K.
Author_Institution
RKDF Inst. of Sci. & Technol., Bhopal, India
fYear
2012
fDate
3-5 Nov. 2012
Firstpage
730
Lastpage
733
Abstract
An identity-based proxy re-signcryption scheme proposed by Wang Huige[9], is a cryptographic technique which provides both confidentiality and authenticity. It is a dual signcryption technique. First, signcryption is done by originator of data and another signcryption performed by semi-trusted entity called âproxyâ to convert signcryption addressed to a âdelegatorâ (i.e., de-signcryptor) to those that can be de-signcrypted by a âdelegateeâ (i.e., de-re-signcryptor), by using special information given by the delegator, called the ârekeyâ. In this paper, we have proposed an improved identity based proxy re-signcryption scheme which improve the performance of scheme proposed by Wang Huige. In our scheme, we have designed and simulated the scheme proposed by Wang Huige using different secure hash functions such as MD5, SHA-1, or SHA-256, separately. Analyzing the scheme so that it gives the high performance.
Keywords
cryptography; ID based proxy resigncryption scheme; Wang Huige; ârekeyâ; cryptographic technique; hash functions; signcryption technique; Algorithm design and analysis; Elliptic curve cryptography; Encryption; Finite element methods; ID-based cryptosystem; bilinear map; etc; random oracle model; re-signcryption; signcryption;
fLanguage
English
Publisher
ieee
Conference_Titel
Computational Intelligence and Communication Networks (CICN), 2012 Fourth International Conference on
Conference_Location
Mathura
Print_ISBN
978-1-4673-2981-1
Type
conf
DOI
10.1109/CICN.2012.133
Filename
6375209
Link To Document