Secure and Efficient IBE-PKE Proxy Re-Encryption

In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only two schemes which enables the conversion of I...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Communications and Computer Sciences, 2011/01/01, Vol.E94.A(1), pp.36-44
Hauptverfasser: MIZUNO, Takeo, DOI, Hiroshi
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 44
container_issue 1
container_start_page 36
container_title IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
container_volume E94.A
creator MIZUNO, Takeo
DOI, Hiroshi
description In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only two schemes which enables the conversion of IBE ciphertexts to PKE ciphertexts has been proposed. One of schemes has some drawbacks such that the size of the re-encrypted ciphertext increases and Bob must be aware of existence of the proxy, which means Bob cannot decrypt a re-encrypted ciphertext with same PKE decryption algorithm. The other one achieves security under Selective-ID model. We propose a new, efficient scheme that enables the conversion of IBE ciphertexts to PKE ciphertexts, and prove full-ID CPA security in the standard model. In our scheme, the size of the re-encrypted ciphertext is optimal and Bob should not aware of existence of the proxy. As far as we know, this is the first IBE-PKE type scheme that holds the above properties.
doi_str_mv 10.1587/transfun.E94.A.36
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_miscellaneous_889419976</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>889419976</sourcerecordid><originalsourceid>FETCH-LOGICAL-c510t-9612d52b758872ab90d95d31eb06a806788bb1a1a88c4bc02d846187e0ac2b33</originalsourceid><addsrcrecordid>eNpdkLFOwzAURS0EEqXwAWzZmBL84sR-HksVoKISFXS3HMeBVKlT7EQif0-rQgemu5xzh0PILdAEchT3vdcu1INLCpkls4TxMzIBkeUxMCbOyYRK4DHmFC_JVQgbSgFTyCaEvlszeBtpV0VFXTemsa6PFg9FvHopopXvvsfozcaFM37c9U3nrslFrdtgb353StaPxXr-HC9fnxbz2TI2OdA-lhzSKk9LkSOKVJeSVjKvGNiSco2UC8SyBA0a0WSloWmFGQcUlmqTloxNyd3xdue7r8GGXm2bYGzbame7IShEmYGUgu9JOJLGdyF4W6udb7bajwqoOrRRf23Uvo2aKXZwFkdnE3r9YU-G9n1jWvvfgNMyfmLMp_bKOvYDmKly4A</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>889419976</pqid></control><display><type>article</type><title>Secure and Efficient IBE-PKE Proxy Re-Encryption</title><source>J-STAGE Free</source><creator>MIZUNO, Takeo ; DOI, Hiroshi</creator><creatorcontrib>MIZUNO, Takeo ; DOI, Hiroshi</creatorcontrib><description>In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only two schemes which enables the conversion of IBE ciphertexts to PKE ciphertexts has been proposed. One of schemes has some drawbacks such that the size of the re-encrypted ciphertext increases and Bob must be aware of existence of the proxy, which means Bob cannot decrypt a re-encrypted ciphertext with same PKE decryption algorithm. The other one achieves security under Selective-ID model. We propose a new, efficient scheme that enables the conversion of IBE ciphertexts to PKE ciphertexts, and prove full-ID CPA security in the standard model. In our scheme, the size of the re-encrypted ciphertext is optimal and Bob should not aware of existence of the proxy. As far as we know, this is the first IBE-PKE type scheme that holds the above properties.</description><identifier>ISSN: 0916-8508</identifier><identifier>ISSN: 1745-1337</identifier><identifier>EISSN: 1745-1337</identifier><identifier>DOI: 10.1587/transfun.E94.A.36</identifier><language>eng</language><publisher>The Institute of Electronics, Information and Communication Engineers</publisher><subject>Algorithms ; bilinear maps ; Computer information security ; Computer simulation ; Conversion ; Electronics ; identity-based encryption ; Optimization ; Proxy client servers ; proxy re-encryption ; public key encryption</subject><ispartof>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011/01/01, Vol.E94.A(1), pp.36-44</ispartof><rights>2011 The Institute of Electronics, Information and Communication Engineers</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c510t-9612d52b758872ab90d95d31eb06a806788bb1a1a88c4bc02d846187e0ac2b33</citedby><cites>FETCH-LOGICAL-c510t-9612d52b758872ab90d95d31eb06a806788bb1a1a88c4bc02d846187e0ac2b33</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,1877,4010,27900,27901,27902</link.rule.ids></links><search><creatorcontrib>MIZUNO, Takeo</creatorcontrib><creatorcontrib>DOI, Hiroshi</creatorcontrib><title>Secure and Efficient IBE-PKE Proxy Re-Encryption</title><title>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</title><addtitle>IEICE Trans. Fundamentals</addtitle><description>In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only two schemes which enables the conversion of IBE ciphertexts to PKE ciphertexts has been proposed. One of schemes has some drawbacks such that the size of the re-encrypted ciphertext increases and Bob must be aware of existence of the proxy, which means Bob cannot decrypt a re-encrypted ciphertext with same PKE decryption algorithm. The other one achieves security under Selective-ID model. We propose a new, efficient scheme that enables the conversion of IBE ciphertexts to PKE ciphertexts, and prove full-ID CPA security in the standard model. In our scheme, the size of the re-encrypted ciphertext is optimal and Bob should not aware of existence of the proxy. As far as we know, this is the first IBE-PKE type scheme that holds the above properties.</description><subject>Algorithms</subject><subject>bilinear maps</subject><subject>Computer information security</subject><subject>Computer simulation</subject><subject>Conversion</subject><subject>Electronics</subject><subject>identity-based encryption</subject><subject>Optimization</subject><subject>Proxy client servers</subject><subject>proxy re-encryption</subject><subject>public key encryption</subject><issn>0916-8508</issn><issn>1745-1337</issn><issn>1745-1337</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2011</creationdate><recordtype>article</recordtype><recordid>eNpdkLFOwzAURS0EEqXwAWzZmBL84sR-HksVoKISFXS3HMeBVKlT7EQif0-rQgemu5xzh0PILdAEchT3vdcu1INLCpkls4TxMzIBkeUxMCbOyYRK4DHmFC_JVQgbSgFTyCaEvlszeBtpV0VFXTemsa6PFg9FvHopopXvvsfozcaFM37c9U3nrslFrdtgb353StaPxXr-HC9fnxbz2TI2OdA-lhzSKk9LkSOKVJeSVjKvGNiSco2UC8SyBA0a0WSloWmFGQcUlmqTloxNyd3xdue7r8GGXm2bYGzbame7IShEmYGUgu9JOJLGdyF4W6udb7bajwqoOrRRf23Uvo2aKXZwFkdnE3r9YU-G9n1jWvvfgNMyfmLMp_bKOvYDmKly4A</recordid><startdate>20110101</startdate><enddate>20110101</enddate><creator>MIZUNO, Takeo</creator><creator>DOI, Hiroshi</creator><general>The Institute of Electronics, Information and Communication Engineers</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope></search><sort><creationdate>20110101</creationdate><title>Secure and Efficient IBE-PKE Proxy Re-Encryption</title><author>MIZUNO, Takeo ; DOI, Hiroshi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c510t-9612d52b758872ab90d95d31eb06a806788bb1a1a88c4bc02d846187e0ac2b33</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Algorithms</topic><topic>bilinear maps</topic><topic>Computer information security</topic><topic>Computer simulation</topic><topic>Conversion</topic><topic>Electronics</topic><topic>identity-based encryption</topic><topic>Optimization</topic><topic>Proxy client servers</topic><topic>proxy re-encryption</topic><topic>public key encryption</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>MIZUNO, Takeo</creatorcontrib><creatorcontrib>DOI, Hiroshi</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>MIZUNO, Takeo</au><au>DOI, Hiroshi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Secure and Efficient IBE-PKE Proxy Re-Encryption</atitle><jtitle>IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences</jtitle><addtitle>IEICE Trans. Fundamentals</addtitle><date>2011-01-01</date><risdate>2011</risdate><volume>E94.A</volume><issue>1</issue><spage>36</spage><epage>44</epage><pages>36-44</pages><issn>0916-8508</issn><issn>1745-1337</issn><eissn>1745-1337</eissn><abstract>In proxy re-encryption schemes, a semi-trusted entity called a proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only two schemes which enables the conversion of IBE ciphertexts to PKE ciphertexts has been proposed. One of schemes has some drawbacks such that the size of the re-encrypted ciphertext increases and Bob must be aware of existence of the proxy, which means Bob cannot decrypt a re-encrypted ciphertext with same PKE decryption algorithm. The other one achieves security under Selective-ID model. We propose a new, efficient scheme that enables the conversion of IBE ciphertexts to PKE ciphertexts, and prove full-ID CPA security in the standard model. In our scheme, the size of the re-encrypted ciphertext is optimal and Bob should not aware of existence of the proxy. As far as we know, this is the first IBE-PKE type scheme that holds the above properties.</abstract><pub>The Institute of Electronics, Information and Communication Engineers</pub><doi>10.1587/transfun.E94.A.36</doi><tpages>9</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0916-8508
ispartof IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2011/01/01, Vol.E94.A(1), pp.36-44
issn 0916-8508
1745-1337
1745-1337
language eng
recordid cdi_proquest_miscellaneous_889419976
source J-STAGE Free
subjects Algorithms
bilinear maps
Computer information security
Computer simulation
Conversion
Electronics
identity-based encryption
Optimization
Proxy client servers
proxy re-encryption
public key encryption
title Secure and Efficient IBE-PKE Proxy Re-Encryption
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-01T02%3A30%3A24IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Secure%20and%20Efficient%20IBE-PKE%20Proxy%20Re-Encryption&rft.jtitle=IEICE%20Transactions%20on%20Fundamentals%20of%20Electronics,%20Communications%20and%20Computer%20Sciences&rft.au=MIZUNO,%20Takeo&rft.date=2011-01-01&rft.volume=E94.A&rft.issue=1&rft.spage=36&rft.epage=44&rft.pages=36-44&rft.issn=0916-8508&rft.eissn=1745-1337&rft_id=info:doi/10.1587/transfun.E94.A.36&rft_dat=%3Cproquest_cross%3E889419976%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=889419976&rft_id=info:pmid/&rfr_iscdi=true