loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Takeo Mizuno 1 and Hiroshi Doi 2

Affiliations: 1 NTT Data Corporation; Institute of Information Security, Japan ; 2 Institute of Information Security, Japan

Keyword(s): Proxy re-encryption, public key encryption, identity-based encryption, bilinear maps.

Related Ontology Subjects/Areas/Topics: Cryptographic Techniques and Key Management ; Information and Systems Security ; Public Key Crypto Applications

Abstract: In proxy re-encryption schemes, a semi-trusted entity called proxy can convert a ciphertext encrypted for Alice into a new ciphertext for Bob without seeing the underlying plaintext. Several proxy re-encryption schemes have been proposed, however, only one scheme which enables the conversion of IBE ciphertexts to PKE ciphertexts has been proposed and it has some drawbacks. In that scheme, the size of the re-encrypted ciphertext increases and Bob must be aware of existence of the proxy, which means Bob cannot decrypt a re-encrypted ciphertext with same PKE decryption algorithm. We propose a new, efficient scheme that enables the conversion of IBE ciphertexts to PKE ciphertexts, and prove CPA security in the standard model. In our scheme, the size of the re-encrypted ciphertext is optimal and Bob does not aware of existence of the proxy. As far as we knows, this is the first IBE-PKE type scheme that holds the above properties.

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 3.15.225.177

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Mizuno, T. and Doi, H. (2008). EFFICIENT IBE-PKE PROXY RE-ENCRYPTION. In Proceedings of the International Conference on Security and Cryptography (ICETE 2008) - SECRYPT; ISBN 978-989-8111-59-3; ISSN 2184-3236, SciTePress, pages 285-293. DOI: 10.5220/0001917802850293

@conference{secrypt08,
author={Takeo Mizuno. and Hiroshi Doi.},
title={EFFICIENT IBE-PKE PROXY RE-ENCRYPTION},
booktitle={Proceedings of the International Conference on Security and Cryptography (ICETE 2008) - SECRYPT},
year={2008},
pages={285-293},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001917802850293},
isbn={978-989-8111-59-3},
issn={2184-3236},
}

TY - CONF

JO - Proceedings of the International Conference on Security and Cryptography (ICETE 2008) - SECRYPT
TI - EFFICIENT IBE-PKE PROXY RE-ENCRYPTION
SN - 978-989-8111-59-3
IS - 2184-3236
AU - Mizuno, T.
AU - Doi, H.
PY - 2008
SP - 285
EP - 293
DO - 10.5220/0001917802850293
PB - SciTePress