期刊文献+

New Constructions for Identity-Based Unidirectional Proxy Re-Encryption 被引量:2

New Constructions for Identity-Based Unidirectional Proxy Re-Encryption
原文传递
导出
摘要 We address the cryptographic topic of proxy re-encryption (PRE), which is a special public-key cryptosystem. A PRE scheme allows a special entity, known as the proxy, to transform a message encrypted with the public key of a delegator (say Alice), into a new ciphertext that is protected under the public key of a delegatee (say Bob), and thus the same message can then be recovered with Bob's private key. In this paper, in the identity-based setting, we first investigate the relationship between so called mediated encryption and unidirectional PRE. We provide a general framework which converts any secure identity-based unidirectional PRE scheme into a secure identity-based mediated encryption scheme, and vice versa. Concerning the security for unidirectional PRE schemes, Ateniese et al. previously suggested an important property known as the master secret security, which requires that the coalition of the proxy and Bob cannot expose Alice's private key. In this paper, we extend the notion to the identity-based setting, and present an identity-based unidirectional PRE scheme, which not only is provably secure against the chosen eiphertext attack in the standard model but also achieves the master secret security at the same time. We address the cryptographic topic of proxy re-encryption (PRE), which is a special public-key cryptosystem. A PRE scheme allows a special entity, known as the proxy, to transform a message encrypted with the public key of a delegator (say Alice), into a new ciphertext that is protected under the public key of a delegatee (say Bob), and thus the same message can then be recovered with Bob's private key. In this paper, in the identity-based setting, we first investigate the relationship between so called mediated encryption and unidirectional PRE. We provide a general framework which converts any secure identity-based unidirectional PRE scheme into a secure identity-based mediated encryption scheme, and vice versa. Concerning the security for unidirectional PRE schemes, Ateniese et al. previously suggested an important property known as the master secret security, which requires that the coalition of the proxy and Bob cannot expose Alice's private key. In this paper, we extend the notion to the identity-based setting, and present an identity-based unidirectional PRE scheme, which not only is provably secure against the chosen eiphertext attack in the standard model but also achieves the master secret security at the same time.
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2010年第4期793-806,共14页 计算机科学技术学报(英文版)
基金 partially supported by the National Natural Science Foundation of China under Grant No.60873229 Shanghai Rising-Star Program under Grant No.09QA1403000 the Office of Research,Singapore Management University
关键词 identity-based encryption (IBE) unidirectional proxy re-encryption mediated encryption (mE) chosen ci-phertext attack (CCA) master secret security (MSS). identity-based encryption (IBE), unidirectional proxy re-encryption, mediated encryption (mE), chosen ci-phertext attack (CCA), master secret security (MSS).
  • 相关文献

参考文献27

  • 1Shamir A. Identity-based cryptosystems and signature schemes. In Proc. Crypto1984, Santa Babara, USA, Aug. 19-22, 1984, pp.47-53.
  • 2Boneh D, Franklin M. Identity based encryption from the Weil pairing. In Proc. Crypto 2001, Santa Barbara, USA, Aug. 19- 23, 2001, pp.213-229.
  • 3Boneh D, Boyen X. Efficient selective-ID secure identity-based encryption without random oracles. In Proc. Eurocrypt 2004, Paris, France, April 9-11, 2004, pp.223-238.
  • 4Boneh D, Boyen X. Secure identity based encryption without random oracles. In Proc. Crypto 2004, Santa Barbara, USA, Aug. 15-19, 2004, pp.443-459.
  • 5Waters B. Efficient identity-based encryption without random oracles. In Proc. Eurocrypt 2005, Aarhus, Denmark, May 22- 26, 20(}5, pp.114-127.
  • 6Gentry C. Practical identity-based encryption without random oracles. In Proc. Eurocrypt 2006, St. Petersburg, Russia, May 28-June 1, 2006, pp.445-464.
  • 7Boneh D, Gentry C, Hamburg M. Space-efficient identity based encryption without pairings. In Proc. the 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2007), Rhode Island, USA, Oct. 20-23, 2007, pp.647- 657.
  • 8Boneh D, Ding X, Tsudik G, Wong C M. A method for fast revocation of public key certificates and security capabilities. In Proc. the lOth USENIX Security Symposium, Washington DC, USA, Aug. 13-17, 2001, pp.297-310.
  • 9Ding X, Tsudik G. Simple identity-based cryptography with mediated RSA. In Proc. CT-RSA 2003, San Francisco, USA, April 13-17, 2003, pp.193-210.
  • 10Libert B, Quisquater J J. Efficient revocation and threshold pairing based cryptosystems. In Proc. the 22nd A CM Symposium on Principles of Distributed Computing (PODC 2003), Boston, USA, July 13-16, 2003, pp.163-171.

同被引文献1

引证文献2

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部