EFFICIENT IBE-PKE PROXY RE-ENCRYPTION

Takeo Mizuno, Hiroshi Doi

2008

Abstract

In proxy re-encryption schemes, a semi-trusted entity called proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only one scheme which enables the conversion of IBE ciphertexts to PKE ciphertexts has been proposed and it has some drawbacks. In that scheme, the size of the re-encrypted ciphertext increases and Bob must be aware of existence of the proxy, which means Bob cannot decrypt a re-encrypted ciphertext with same PKE decryption algorithm. We propose a new, efficient scheme that enables the conversion of IBE ciphertexts to PKE ciphertexts, and prove CPA security in the standard model. In our scheme, the size of the re-encrypted ciphertext is optimal and Bob does not aware of existence of the proxy. As far as we knows, this is the first IBE-PKE type scheme that holds the above properties.

References

  1. B.Waters (2005). Efficient identity-based encryption without random oracles. In In Proceedings of Eurocrypt 7805, volume 3494 of LNCS, pages 114-127. SpringerVerlag.
  2. D.Boneh and X.Boyen (2004). Efficient selectiveid secure identity based encryption without random oracle. In In Advances in Cryptology - EUROCRYPT'04, volume 3027 of LNCS, pages 223-238. Springer-Verlag.
  3. G.Ateniese, K.Fu, M.Green, and S.Hohenberger (2005). Improved proxy re-encryption schemes with applications to secure distributed storage. In In Proceedings of the 12th Annual Network and Distributed System Security Symposium - NDSS'05, pages 83-107.
  4. L.Zbou, M.A.Marsh, F.B.Schneider, and A.Redz (2004). Distributed blinding for elgamal reencryption. In Technical Report 2004-1924. Cornell Computer Science Department.
  5. M.Blaze, G.Bleumer, and M.Strauss (1998). Divertible protocols and atomic proxy cryptography. In In Advances in Cryptology - EUROCRYPT'98, volume 1403 of LNCS, pages 127-144. Springer-Verlag.
  6. M.Green and G.Ateniese (2007). Indentity-based proxy reencryption. In ACNS 2007, volume 4521 of LNCS, pages 288-306. Springer-Verlag.
  7. M.Jakobsson (1999). On quorum controlled asymmetric proxy re-encryption. In In Proceedings of Public Key Cryptography - PKC'99, volume 1560 of LNCS, pages 112-121. Springer-Verlag.
  8. M.Mambo and E.Okamoto (1997). Proxy cryptosystems: Delegation of the power to decrypt ciphertexts. In IEICE Trans. Fund. Electronics Communications and Computer Science E80-A/1, pages 54-63. IEICE.
  9. R.Canetti, S.Halevi, and J.Katz (2004). Chosen-ciphertext security from identity based encryption. In In Proceedings of Eurocrypt 7804, volume 3027 of LNCS, pages 207-222. Springer-Verlag.
  10. R.Canetti and S.Hohenberger (2007). Chosen-ciphertext secure proxy re-encryption. In CCS 7807: Proceedings of the 14th ACM conference on Computer and communications security, pages 185-194. ACM.
  11. T.Matsuo (2007). Proxy re-encryption systems for identitybased encryption. In In Proceedings of Pairing-Based Cryptography - Pairing'07, volume 4575 of LNCS, pages 247-267. Springer-Verlag.
  12. Y.Dodis and A.Ivan (2003). Proxy cryptography revisited. In In Proceedings of the 10th Annual Network and Distributed System Security Symposium- NDSS'03.
Download


Paper Citation


in Harvard Style

Mizuno T. and Doi H. (2008). EFFICIENT IBE-PKE PROXY RE-ENCRYPTION . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008) ISBN 978-989-8111-59-3, pages 285-293. DOI: 10.5220/0001917802850293


in Bibtex Style

@conference{secrypt08,
author={Takeo Mizuno and Hiroshi Doi},
title={EFFICIENT IBE-PKE PROXY RE-ENCRYPTION},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)},
year={2008},
pages={285-293},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001917802850293},
isbn={978-989-8111-59-3},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2008)
TI - EFFICIENT IBE-PKE PROXY RE-ENCRYPTION
SN - 978-989-8111-59-3
AU - Mizuno T.
AU - Doi H.
PY - 2008
SP - 285
EP - 293
DO - 10.5220/0001917802850293