会议专题

Prozy Re-encryption Scheme Based on SK Identity Based Encryption

The concept of proxy re-cryptography comes from the work of Blaze, Bleumer, and Strauss in 1998 2. The goal of proxy re-encryption is to securely enable the re-encryption of ciphertexts from one key to another, without relying on trusted parties.In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE to CBE, IBE to CBE, CBE to IBE and IBE to IBE 13. Now CBE to IBE and IBE to IBE proxy re-encryption schemes are being standardized by IEEEP1363.3 working group 14. One feature of their schemes is that they are all based on BB1 identity based encryption 4. We reconsider the problem of constructing proxy re-encryption based on SK identity based encryption. Surprisingly, if we consider the help of PKG, then it is easy to construct proxy re-encryption based on SK identity based encryption. Interestingly, our proxy reencryption scheme even can achieve CCA2 secure, which makes it is unique.

Xu an Wang Xiaoyuan Yang

Key Laboratory of Information and Network Security Engneering College of Chinese Armed Police Force,P.R.China

国际会议

The Fifth International Conference on Information Assurance and Security(第五届信息保障与安全国际会议)

西安

英文

657-660

2009-08-18(万方平台首次上网日期,不代表论文的发表时间)