首页    期刊浏览 2024年11月24日 星期日
登录注册

文章基本信息

  • 标题:Hybrid Proxy Re-encryption Between IBE And CBE
  • 本地全文:下载
  • 作者:Zhang, Jindan ; Wang, Xu An ; Yang, Xiaoyuan
  • 期刊名称:Journal of Computers
  • 印刷版ISSN:1796-203X
  • 出版年度:2013
  • 卷号:8
  • 期号:7
  • 页码:1873-1881
  • DOI:10.4304/jcp.8.7.1873-1881
  • 语种:English
  • 出版社:Academy Publisher
  • 摘要:In proxy re-encryption, a proxy can transform a ciphertext computed under Alice’s public key into one that can be opened under Bob’s decryption key. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE(Certificate Based Public Key Encryption) to IBE(Identity Based Encryption)(type 1), IBE to IBE(type 2), IBE to CBE (type 3), CBE to CBE (type 4). We observe that the proxy re-encryption from CBE to IBE scheme in Matsuo’s scheme inherits the key escrow problem from IBE. Is this necessary for proxy re-encryption from CBE to IBE? We give a negative answer. If we emphasis on the PKG’s involving in the re-encryption key generation, some interesting results can be obtained. We propose the concept of hybrid proxy re-encryption without key escrow, give the new security model for this primitive, construct such a scheme and prove its security. Furthermore, we construct the first proxy re-encryption scheme from from IBE to CBE, giving the security model for this new primitive and prove its security. At last, we compare our schemes with other related schemes, the results show that our schemes can have high level security with good efficiency.
  • 关键词:Cryptography;Hybrid proxy re-encryption;IBE;CBE;Without key escrow;Security proof.
国家哲学社会科学文献中心版权所有