Open Access
ARTICLE
Key-Private Identity-Based Proxy Re-Encryption
1 College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210000, China.
2 IBM, Research Triangle Park, North Carolina, 27709, USA.
* Corresponding Author: Chunpeng Ge. Email: .
Computers, Materials & Continua 2020, 63(2), 633-647. https://doi.org/10.32604/cmc.2020.06217
Received 25 January 2019; Accepted 14 July 2019; Issue published 01 May 2020
Abstract
An identity-based proxy re-encryption scheme (IB-PRE) allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message. Due to the fact that the proxy was semi-trusted, it should place as little trust as necessary to allow it to perform the translations. In some applications such as distributed file system, it demands the adversary cannot identify the sender and recipient’s identities. However, none of the exiting IB-PRE schemes satisfy this requirement. In this work, we first define the security model of key-private IB-PRE. Finally, we propose the first key-private IB-PRE scheme. Our scheme is chosen plaintext secure (CPA) and collusion resistant in the standard model.Keywords
Cite This Article
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.