earticle

논문검색

Collusion-Resistant Identity-Based Proxy Re-Encryption Without Random Oracles

초록

영어

In an identity-based proxy re-encryption scheme, a semi-trusted proxy can convert a ciphertext under Alice’s public identity into a ciphertext for Bob. The proxy does not know the secret key of Alice or Bob, and also does not know the plaintext during the conversion. In identity-based proxy re-encryption, the collusion of the proxy and a delegatee may result in the decryption of ciphertext for delegator. In this paper, we present a new scheme which can avoid the collusion of proxy and delegatee. Our scheme improves the scheme of Chu and Tzeng while inheriting all useful properties such as unidirectionality and non-interactivity. In our scheme, we get the security by using added secret parameter and change the secret key and re-encryption key. Our sheme is secure against Chosen-Ciphertext Attack (CCA) and collusion attack in the standard model.

목차

Abstract
 1. Introduction
 2. Preliminaries
  2.1 Bilinear groups
  2.2 The Identity-based Proxy Re-encryption
  2.3 Decisional Bilinear Diffie-hellman Assumption
 3. New Identity-based Proxy Re-encryption
  3.1 Analysis of Collusion Attack in [9]
  3.2 New IB-PRE Algorithms
  3.3 Correctness
  3.4 Security
  3.5 Comparison
 4. Conclusions
 Acknowledgement
 References

저자정보

  • JunJie Qiu Department of Ubiquitous IT, Graduate School of Dongseo University, Busan, Korea, Weifang University of Science & Technology, Weifang, China
  • JungBok Jo Department of Ubiquitous IT, Graduate School of Dongseo University, Busan, Korea
  • HoonJae Lee Department of Ubiquitous IT, Graduate School of Dongseo University, Busan, Korea

참고문헌

자료제공 : 네이버학술정보

    함께 이용한 논문

      ※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

      0개의 논문이 장바구니에 담겼습니다.