Table of Content

Open Access iconOpen Access

ARTICLE

Key-Private Identity-Based Proxy Re-Encryption

Chunpeng Ge1, *, Jinyue Xia2, Liming Fang1

1 College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210000, China.
2 IBM, Research Triangle Park, North Carolina, 27709, USA.

* Corresponding Author: Chunpeng Ge. Email: email.

Computers, Materials & Continua 2020, 63(2), 633-647. https://doi.org/10.32604/cmc.2020.06217

Abstract

An identity-based proxy re-encryption scheme (IB-PRE) allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message. Due to the fact that the proxy was semi-trusted, it should place as little trust as necessary to allow it to perform the translations. In some applications such as distributed file system, it demands the adversary cannot identify the sender and recipient’s identities. However, none of the exiting IB-PRE schemes satisfy this requirement. In this work, we first define the security model of key-private IB-PRE. Finally, we propose the first key-private IB-PRE scheme. Our scheme is chosen plaintext secure (CPA) and collusion resistant in the standard model.

Keywords


Cite This Article

C. Ge, J. Xia and L. Fang, "Key-private identity-based proxy re-encryption," Computers, Materials & Continua, vol. 63, no.2, pp. 633–647, 2020. https://doi.org/10.32604/cmc.2020.06217



cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1731

    View

  • 1171

    Download

  • 0

    Like

Related articles

Share Link