Table of Content

Open Access

ARTICLE

Key-Private Identity-Based Proxy Re-Encryption

Chunpeng Ge1, *, Jinyue Xia2, Liming Fang1
1 College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210000, China.
2 IBM, Research Triangle Park, North Carolina, 27709, USA.
* Corresponding Author: Chunpeng Ge. Email: .

Computers, Materials & Continua 2020, 63(2), 633-647. https://doi.org/10.32604/cmc.2020.06217

Received 25 January 2019; Accepted 14 July 2019; Issue published 01 May 2020

Abstract

An identity-based proxy re-encryption scheme (IB-PRE) allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message. Due to the fact that the proxy was semi-trusted, it should place as little trust as necessary to allow it to perform the translations. In some applications such as distributed file system, it demands the adversary cannot identify the sender and recipient’s identities. However, none of the exiting IB-PRE schemes satisfy this requirement. In this work, we first define the security model of key-private IB-PRE. Finally, we propose the first key-private IB-PRE scheme. Our scheme is chosen plaintext secure (CPA) and collusion resistant in the standard model.

Keywords

Proxy re-encryption, identity-based proxy re-encryption, key-private, collusion resistant.

Cite This Article

C. Ge, J. Xia and L. Fang, "Key-private identity-based proxy re-encryption," Computers, Materials & Continua, vol. 63, no.2, pp. 633–647, 2020.



This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1217

    View

  • 868

    Download

  • 0

    Like

Related articles

Share Link

WeChat scan