Identity-based proxy re-encryption

Matthew Green, Giuseppe Ateniese

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

551 Scopus citations

Abstract

In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identity to another. Our schemes are compatible with current IBE deployments and do not require any extra work from the IBE trusted-party key generator. In addition, they are non-interactive and one of them permits multiple re-encryptions. Their security is based on a standard assumption (DBDH) in the random oracle model.

Original languageEnglish
Title of host publicationApplied Cryptography and Network Security - 5th International Conference, ACNS 2007, Proceedings
Pages288-306
Number of pages19
DOIs
StatePublished - 2007
Event5th International Conference on Applied Cryptography and Network Security, ACNS 2007 - Zhuhai, China
Duration: 5 Jun 20078 Jun 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4521 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference5th International Conference on Applied Cryptography and Network Security, ACNS 2007
Country/TerritoryChina
CityZhuhai
Period5/06/078/06/07

Keywords

  • Bilinear maps
  • Identity-based encryption
  • Proxy re-encryption

Fingerprint

Dive into the research topics of 'Identity-based proxy re-encryption'. Together they form a unique fingerprint.

Cite this