DocumentCode :
3319456
Title :
Proxy re-encryption scheme based on BB2 identity based encryption
Author :
Yang, Xiaoyuan ; Wang, Xu An
Author_Institution :
Key Lab. of Inf. & Network Security, Chinese Armed Police Force, Xi´´an, China
fYear :
2009
fDate :
8-11 Aug. 2009
Firstpage :
134
Lastpage :
137
Abstract :
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice´s public key into one that can be opened under Bob´s decryption key. They predicated that proxy re-encryption and re-signature will play an important role in our life. In 2007, Matsuo proposed the concept of four types of re-encryption schemes: CBE to IBE(type 1), IBE to IBE(type 2), IBE to CBE (type 3), CBE to CBE (type 4 ). Now CBE to IBE and IBE to IBE proxy re-encryption schemes are being standardized by IEEEP1363.3 working group. One feature of proxy re-encryption schemes proposed by Matsuo is that they are all based on BB1 identity based encryption.We ask question like this: can we construct proxy re-encryption schemes based on BB2 identity based encryption? We give affirmative answer to this question. We construct an IBE to IBE proxy re-encryption scheme based on BB2 with the help of PKG and prove its security in the standard model.
Keywords :
digital signatures; public key cryptography; BB2 identity based encryption; IEEEP1363.3 working group; ciphertext; decryption key; proxy reencryption scheme; public key; Educational institutions; Identity-based encryption; Information security; Laboratories; Public key; Public key cryptography; Secure storage; Standards Working Groups;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Science and Information Technology, 2009. ICCSIT 2009. 2nd IEEE International Conference on
Conference_Location :
Beijing
Print_ISBN :
978-1-4244-4519-6
Electronic_ISBN :
978-1-4244-4520-2
Type :
conf
DOI :
10.1109/ICCSIT.2009.5234980
Filename :
5234980
Link To Document :
بازگشت