TY - GEN
T1 - Identity-based proxy re-encryption
AU - Green, Matthew
AU - Ateniese, Giuseppe
PY - 2007
Y1 - 2007
N2 - In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identity to another. Our schemes are compatible with current IBE deployments and do not require any extra work from the IBE trusted-party key generator. In addition, they are non-interactive and one of them permits multiple re-encryptions. Their security is based on a standard assumption (DBDH) in the random oracle model.
AB - In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identity to another. Our schemes are compatible with current IBE deployments and do not require any extra work from the IBE trusted-party key generator. In addition, they are non-interactive and one of them permits multiple re-encryptions. Their security is based on a standard assumption (DBDH) in the random oracle model.
KW - Bilinear maps
KW - Identity-based encryption
KW - Proxy re-encryption
UR - http://www.scopus.com/inward/record.url?scp=38049061546&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=38049061546&partnerID=8YFLogxK
U2 - 10.1007/978-3-540-72738-5_19
DO - 10.1007/978-3-540-72738-5_19
M3 - Conference contribution
AN - SCOPUS:38049061546
SN - 9783540727378
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 288
EP - 306
BT - Applied Cryptography and Network Security - 5th International Conference, ACNS 2007, Proceedings
T2 - 5th International Conference on Applied Cryptography and Network Security, ACNS 2007
Y2 - 5 June 2007 through 8 June 2007
ER -