Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1)
  • Open Access


    Key-Private Identity-Based Proxy Re-Encryption

    Chunpeng Ge1, *, Jinyue Xia2, Liming Fang1

    CMC-Computers, Materials & Continua, Vol.63, No.2, pp. 633-647, 2020, DOI:10.32604/cmc.2020.06217

    Abstract An identity-based proxy re-encryption scheme (IB-PRE) allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message. Due to the fact that the proxy was semi-trusted, it should place as little trust as necessary to allow it to perform the translations. In some applications such as distributed file system, it demands the adversary cannot identify the sender and recipient’s identities. However, none of the exiting IB-PRE schemes satisfy this requirement. In this work, we first define the security model of key-private IB-PRE. Finally, we propose the first key-private IB-PRE scheme. Our scheme is… More >

Displaying 1-10 on page 1 of 1. Per Page