원문정보
초록
영어
In an identity-based proxy re-encryption scheme, a semi-trusted proxy can convert a ciphertext under Alice’s public identity into a ciphertext for Bob. The proxy does not know the secret key of Alice or Bob, and also does not know the plaintext during the conversion. In identity-based proxy re-encryption, the collusion of the proxy and a delegatee may result in the decryption of ciphertext for delegator. In this paper, we present a new scheme which can avoid the collusion of proxy and delegatee. Our scheme improves the scheme of Chu and Tzeng while inheriting all useful properties such as unidirectionality and non-interactivity. In our scheme, we get the security by using added secret parameter and change the secret key and re-encryption key. Our sheme is secure against Chosen-Ciphertext Attack (CCA) and collusion attack in the standard model.
목차
1. Introduction
2. Preliminaries
2.1 Bilinear groups
2.2 The Identity-based Proxy Re-encryption
2.3 Decisional Bilinear Diffie-hellman Assumption
3. New Identity-based Proxy Re-encryption
3.1 Analysis of Collusion Attack in [9]
3.2 New IB-PRE Algorithms
3.3 Correctness
3.4 Security
3.5 Comparison
4. Conclusions
Acknowledgement
References
