Table of Content

Open Access iconOpen Access


Key-Private Identity-Based Proxy Re-Encryption

Chunpeng Ge1, *, Jinyue Xia2, Liming Fang1

1 College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210000, China.
2 IBM, Research Triangle Park, North Carolina, 27709, USA.

* Corresponding Author: Chunpeng Ge. Email: email.

Computers, Materials & Continua 2020, 63(2), 633-647.


An identity-based proxy re-encryption scheme (IB-PRE) allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message. Due to the fact that the proxy was semi-trusted, it should place as little trust as necessary to allow it to perform the translations. In some applications such as distributed file system, it demands the adversary cannot identify the sender and recipient’s identities. However, none of the exiting IB-PRE schemes satisfy this requirement. In this work, we first define the security model of key-private IB-PRE. Finally, we propose the first key-private IB-PRE scheme. Our scheme is chosen plaintext secure (CPA) and collusion resistant in the standard model.


Cite This Article

APA Style
Ge, C., Xia, J., Fang, L. (2020). Key-private identity-based proxy re-encryption. Computers, Materials & Continua, 63(2), 633-647.
Vancouver Style
Ge C, Xia J, Fang L. Key-private identity-based proxy re-encryption. Comput Mater Contin. 2020;63(2):633-647
IEEE Style
C. Ge, J. Xia, and L. Fang "Key-Private Identity-Based Proxy Re-Encryption," Comput. Mater. Contin., vol. 63, no. 2, pp. 633-647. 2020.

cc This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1751


  • 1203


  • 0


Related articles

Share Link