Presentation | 2007-12-19 A Study of IBE to PKE Proxy Re-Encryption Takeo MIZUNO, Hiroshi DOI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | A proxy re-encryption scheme allows the proxy to transform ciphertexts encrypted under Alice's public key into the different ciphertexts which can be decrypted by Bob's secret key without exposing Alice's secret key. Many Proxy re-encryption schemes have been proposed, some schemes enables transformation of ciphertexts encrypted by Certificate based Public Key Encryption scheme (PKE), and some one enables transformation of ciphertexts encrypted by Identity Based Encryption scheme (IBE), and hybrid schemes which enables transform PKE to IBE, IBE to PKE were proposed. But IBE to PKE type Hybrid Scheme was proposed only one, and suffers from collusion attacks, i.e., Bob can collude with the proxy to reveal Alice's secret key. We propose a scheme which enables IBE to PKE transformation and resist the collusion attacks. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | Proxy Re-Encryption / public key encryption / identity-based encryption / bilinear maps |
Paper # | ISEC2007-124 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2007/12/12(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | A Study of IBE to PKE Proxy Re-Encryption |
Sub Title (in English) | |
Keyword(1) | Proxy Re-Encryption |
Keyword(2) | public key encryption |
Keyword(3) | identity-based encryption |
Keyword(4) | bilinear maps |
1st Author's Name | Takeo MIZUNO |
1st Author's Affiliation | INSTITUTE of INFORMATION SECURITY() |
2nd Author's Name | Hiroshi DOI |
2nd Author's Affiliation | INSTITUTE of INFORMATION SECURITY |
Date | 2007-12-19 |
Paper # | ISEC2007-124 |
Volume (vol) | vol.107 |
Number (no) | 397 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |