CryptoDB
Identity-Based Proxy Re-encryption
Authors: | |
---|---|
Download: | |
Abstract: | In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob {\em without} seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one {\it identity} to another. Our schemes are compatible with current IBE deployments and do not require any extra work from the IBE trusted-party key generator. In addition, they are non-interactive and one of them permits multiple re-encryptions. Their security is based on a standard assumption (DBDH) in the random oracle model. |
BibTeX
@misc{eprint-2006-21964, title={Identity-Based Proxy Re-encryption}, booktitle={IACR Eprint archive}, keywords={public-key cryptography / proxy re-encryption, identity-based encryption, bilinear maps}, url={http://eprint.iacr.org/2006/473}, note={ mgreen@cs.jhu.edu 13498 received 15 Dec 2006}, author={Matthew Green and Giuseppe Ateniese}, year=2006 }