Secure and Efficient IBE-PKE Proxy Re-Encryption
In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only two schemes which enables the conversion of I...
Gespeichert in:
Veröffentlicht in: | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Communications and Computer Sciences, 2011/01/01, Vol.E94.A(1), pp.36-44 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 44 |
---|---|
container_issue | 1 |
container_start_page | 36 |
container_title | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences |
container_volume | E94.A |
creator | MIZUNO, Takeo DOI, Hiroshi |
description | In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only two schemes which enables the conversion of IBE ciphertexts to PKE ciphertexts has been proposed. One of schemes has some drawbacks such that the size of the re-encrypted ciphertext increases and Bob must be aware of existence of the proxy, which means Bob cannot decrypt a re-encrypted ciphertext with same PKE decryption algorithm. The other one achieves security under Selective-ID model. We propose a new, efficient scheme that enables the conversion of IBE ciphertexts to PKE ciphertexts, and prove full-ID CPA security in the standard model. In our scheme, the size of the re-encrypted ciphertext is optimal and Bob should not aware of existence of the proxy. As far as we know, this is the first IBE-PKE type scheme that holds the above properties. |
doi_str_mv | 10.1587/transfun.E94.A.36 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_889419976</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>889419976</sourcerecordid><originalsourceid>FETCH-LOGICAL-c510t-9612d52b758872ab90d95d31eb06a806788bb1a1a88c4bc02d846187e0ac2b33</originalsourceid><addsrcrecordid>eNpdkLFOwzAURS0EEqXwAWzZmBL84sR-HksVoKISFXS3HMeBVKlT7EQif0-rQgemu5xzh0PILdAEchT3vdcu1INLCpkls4TxMzIBkeUxMCbOyYRK4DHmFC_JVQgbSgFTyCaEvlszeBtpV0VFXTemsa6PFg9FvHopopXvvsfozcaFM37c9U3nrslFrdtgb353StaPxXr-HC9fnxbz2TI2OdA-lhzSKk9LkSOKVJeSVjKvGNiSco2UC8SyBA0a0WSloWmFGQcUlmqTloxNyd3xdue7r8GGXm2bYGzbame7IShEmYGUgu9JOJLGdyF4W6udb7bajwqoOrRRf23Uvo2aKXZwFkdnE3r9YU-G9n1jWvvfgNMyfmLMp_bKOvYDmKly4A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>889419976</pqid></control><display><type>article</type><title>Secure and Efficient IBE-PKE Proxy Re-Encryption</title><source>J-STAGE Free</source><creator>MIZUNO, Takeo ; DOI, Hiroshi</creator><creatorcontrib>MIZUNO, Takeo ; DOI, Hiroshi</creatorcontrib><description>In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only two schemes which enables the conversion of IBE ciphertexts to PKE ciphertexts has been proposed. One of schemes has some drawbacks such that the size of the re-encrypted ciphertext increases and Bob must be aware of existence of the proxy, which means Bob cannot decrypt a re-encrypted ciphertext with same PKE decryption algorithm. The other one achieves security under Selective-ID model. We propose a new, efficient scheme that enables the conversion of IBE ciphertexts to PKE ciphertexts, and prove full-ID CPA security in the standard model. In our scheme, the size of the re-encrypted ciphertext is optimal and Bob should not aware of existence of the proxy. As far as we know, this is the first IBE-PKE type scheme that holds the above properties.</description><identifier>ISSN: 0916-8508</identifier><identifier>ISSN: 1745-1337</identifier><identifier>EISSN: 1745-1337</identifier><identifier>DOI: 10.1587/transfun.E94.A.36</identifier><language>eng</language><publisher>The Institute of Electronics, Information and Communication Engineers</publisher><subject>Algorithms ; bilinear maps ; Computer information security ; Computer simulation ; Conversion ; Electronics ; identity-based encryption ; Optimization ; Proxy client servers ; proxy re-encryption ; public key encryption</subject><ispartof>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011/01/01, Vol.E94.A(1), pp.36-44</ispartof><rights>2011 The Institute of Electronics, Information and Communication Engineers</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c510t-9612d52b758872ab90d95d31eb06a806788bb1a1a88c4bc02d846187e0ac2b33</citedby><cites>FETCH-LOGICAL-c510t-9612d52b758872ab90d95d31eb06a806788bb1a1a88c4bc02d846187e0ac2b33</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,1877,4010,27900,27901,27902</link.rule.ids></links><search><creatorcontrib>MIZUNO, Takeo</creatorcontrib><creatorcontrib>DOI, Hiroshi</creatorcontrib><title>Secure and Efficient IBE-PKE Proxy Re-Encryption</title><title>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</title><addtitle>IEICE Trans. Fundamentals</addtitle><description>In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only two schemes which enables the conversion of IBE ciphertexts to PKE ciphertexts has been proposed. One of schemes has some drawbacks such that the size of the re-encrypted ciphertext increases and Bob must be aware of existence of the proxy, which means Bob cannot decrypt a re-encrypted ciphertext with same PKE decryption algorithm. The other one achieves security under Selective-ID model. We propose a new, efficient scheme that enables the conversion of IBE ciphertexts to PKE ciphertexts, and prove full-ID CPA security in the standard model. In our scheme, the size of the re-encrypted ciphertext is optimal and Bob should not aware of existence of the proxy. As far as we know, this is the first IBE-PKE type scheme that holds the above properties.</description><subject>Algorithms</subject><subject>bilinear maps</subject><subject>Computer information security</subject><subject>Computer simulation</subject><subject>Conversion</subject><subject>Electronics</subject><subject>identity-based encryption</subject><subject>Optimization</subject><subject>Proxy client servers</subject><subject>proxy re-encryption</subject><subject>public key encryption</subject><issn>0916-8508</issn><issn>1745-1337</issn><issn>1745-1337</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNpdkLFOwzAURS0EEqXwAWzZmBL84sR-HksVoKISFXS3HMeBVKlT7EQif0-rQgemu5xzh0PILdAEchT3vdcu1INLCpkls4TxMzIBkeUxMCbOyYRK4DHmFC_JVQgbSgFTyCaEvlszeBtpV0VFXTemsa6PFg9FvHopopXvvsfozcaFM37c9U3nrslFrdtgb353StaPxXr-HC9fnxbz2TI2OdA-lhzSKk9LkSOKVJeSVjKvGNiSco2UC8SyBA0a0WSloWmFGQcUlmqTloxNyd3xdue7r8GGXm2bYGzbame7IShEmYGUgu9JOJLGdyF4W6udb7bajwqoOrRRf23Uvo2aKXZwFkdnE3r9YU-G9n1jWvvfgNMyfmLMp_bKOvYDmKly4A</recordid><startdate>20110101</startdate><enddate>20110101</enddate><creator>MIZUNO, Takeo</creator><creator>DOI, Hiroshi</creator><general>The Institute of Electronics, Information and Communication Engineers</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20110101</creationdate><title>Secure and Efficient IBE-PKE Proxy Re-Encryption</title><author>MIZUNO, Takeo ; DOI, Hiroshi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c510t-9612d52b758872ab90d95d31eb06a806788bb1a1a88c4bc02d846187e0ac2b33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Algorithms</topic><topic>bilinear maps</topic><topic>Computer information security</topic><topic>Computer simulation</topic><topic>Conversion</topic><topic>Electronics</topic><topic>identity-based encryption</topic><topic>Optimization</topic><topic>Proxy client servers</topic><topic>proxy re-encryption</topic><topic>public key encryption</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>MIZUNO, Takeo</creatorcontrib><creatorcontrib>DOI, Hiroshi</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>MIZUNO, Takeo</au><au>DOI, Hiroshi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure and Efficient IBE-PKE Proxy Re-Encryption</atitle><jtitle>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</jtitle><addtitle>IEICE Trans. Fundamentals</addtitle><date>2011-01-01</date><risdate>2011</risdate><volume>E94.A</volume><issue>1</issue><spage>36</spage><epage>44</epage><pages>36-44</pages><issn>0916-8508</issn><issn>1745-1337</issn><eissn>1745-1337</eissn><abstract>In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only two schemes which enables the conversion of IBE ciphertexts to PKE ciphertexts has been proposed. One of schemes has some drawbacks such that the size of the re-encrypted ciphertext increases and Bob must be aware of existence of the proxy, which means Bob cannot decrypt a re-encrypted ciphertext with same PKE decryption algorithm. The other one achieves security under Selective-ID model. We propose a new, efficient scheme that enables the conversion of IBE ciphertexts to PKE ciphertexts, and prove full-ID CPA security in the standard model. In our scheme, the size of the re-encrypted ciphertext is optimal and Bob should not aware of existence of the proxy. As far as we know, this is the first IBE-PKE type scheme that holds the above properties.</abstract><pub>The Institute of Electronics, Information and Communication Engineers</pub><doi>10.1587/transfun.E94.A.36</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0916-8508 |
ispartof | IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011/01/01, Vol.E94.A(1), pp.36-44 |
issn | 0916-8508 1745-1337 1745-1337 |
language | eng |
recordid | cdi_proquest_miscellaneous_889419976 |
source | J-STAGE Free |
subjects | Algorithms bilinear maps Computer information security Computer simulation Conversion Electronics identity-based encryption Optimization Proxy client servers proxy re-encryption public key encryption |
title | Secure and Efficient IBE-PKE Proxy Re-Encryption |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T02%3A30%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20and%20Efficient%20IBE-PKE%20Proxy%20Re-Encryption&rft.jtitle=IEICE%20Transactions%20on%20Fundamentals%20of%20Electronics,%20Communications%20and%20Computer%20Sciences&rft.au=MIZUNO,%20Takeo&rft.date=2011-01-01&rft.volume=E94.A&rft.issue=1&rft.spage=36&rft.epage=44&rft.pages=36-44&rft.issn=0916-8508&rft.eissn=1745-1337&rft_id=info:doi/10.1587/transfun.E94.A.36&rft_dat=%3Cproquest_cross%3E889419976%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=889419976&rft_id=info:pmid/&rfr_iscdi=true |