跳到主要导航 跳到搜索 跳到主要内容

Multi-use and unidirectional identity-based proxy re-encryption schemes

  • Hongbing Wang
  • , Zhenfu Cao*
  • , Licheng Wang
  • *此作品的通讯作者
  • Shanghai Jiao Tong University
  • Beijing University of Posts and Telecommunications

科研成果: 期刊稿件文章同行评审

摘要

In a proxy re-encryption scheme, a semi-trusted proxy is given special power that allows it to transform a ciphertext for Alice into a ciphertext for Bob without learning any information about the messages encrypted under either key. When a proxy re-encryption scheme is constructed in an identity-based setting, it means that a proxy converts a ciphertext encrypted under Alice's identity into a ciphertext under Bob's. Proxy re-encryption has become more and more popular these years due to the fact that it has many practical applications. In this paper, we present an IND-CCA2 secure identity-based proxy re-encryption scheme which has several useful properties, including, multi-use, unidirectionality, etc. Finding a unidirectional, multi-use, and CCA2-secure proxy re-encryption scheme is presented as an open problem by Green et al. Fortunately, our identity-based proxy re-encryption scheme is a solution to this problem. As a middleware for fulfilling our main goal, we also propose a new construction of identity-based encryption using random padding techniques. The security of our schemes is based on the standard decisional bilinear Diffie-Hellman assumption in the random oracle model.

源语言英语
页(从-至)4042-4059
页数18
期刊Information Sciences
180
20
DOI
出版状态已出版 - 15 10月 2010
已对外发布

指纹

探究 'Multi-use and unidirectional identity-based proxy re-encryption schemes' 的科研主题。它们共同构成独一无二的指纹。

引用此