Title :
Proxy Re-Encryption Schemes with Proxy Having Its Own Public/Private Keys
Author :
Wei, Ping ; Wang, Xu An ; Yang, Xiaoyuan
Author_Institution :
Eng. Coll., Chinese Armed Police Force, Xi´´an, China
Abstract :
Proxy re-encryption (PRE) allows a ciphertext computed under Alice´s public key to be transformed to those which can be decrypted by Bob. Since Blaze et al. introduced the concept of proxy re-encryption in Eurocrypt´98, there are many results on proxy re-encryption. However, all the proxy re-encryption schemes proposed until now assume the proxy having no its own public/private keys. In this paper, we investigate the benefits of proxy having its own public/private keys. We find that if we allow the proxy having its own public/private key, then the proxy can not act as malicious as the proxy in the traditional PRE. The proxy can be trusted to sign on the re-encrypted ciphertext, which somewhat make the authentication on the re-encrypted ciphertext no necessary again. Based on this observation, we give two proposals to try to solve two open problems in the PRE field.
Keywords :
private key cryptography; public key cryptography; Alice public key; authentication; decryption; private key; proxy re-encryption scheme; public key; re-encrypted ciphertext; Encryption; Games; Proposals; Public key; Transforms;
Conference_Titel :
Database Technology and Applications (DBTA), 2010 2nd International Workshop on
Conference_Location :
Wuhan
Print_ISBN :
978-1-4244-6975-8
Electronic_ISBN :
978-1-4244-6977-2
DOI :
10.1109/DBTA.2010.5658954