Open Access
ARTICLE
Key-Private Identity-Based Proxy Re-Encryption
Chunpeng Ge1, *, Jinyue Xia2, Liming Fang1
1 College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210000, China.
2 IBM, Research Triangle Park, North Carolina, 27709, USA.
* Corresponding Author: Chunpeng Ge. Email: .
Computers, Materials & Continua 2020, 63(2), 633-647. https://doi.org/10.32604/cmc.2020.06217
Received 25 January 2019; Accepted 14 July 2019; Issue published 01 May 2020
Abstract
An identity-based proxy re-encryption scheme (IB-PRE) allows a semi-trusted
proxy to convert an encryption under one identity to another without revealing the
underlying message. Due to the fact that the proxy was semi-trusted, it should place as
little trust as necessary to allow it to perform the translations. In some applications such
as distributed file system, it demands the adversary cannot identify the sender and
recipient’s identities. However, none of the exiting IB-PRE schemes satisfy this
requirement. In this work, we first define the security model of key-private IB-PRE.
Finally, we propose the first key-private IB-PRE scheme. Our scheme is chosen plaintext
secure (CPA) and collusion resistant in the standard model.
Keywords
Cite This Article
APA Style
Ge, C., Xia, J., Fang, L. (2020). Key-private identity-based proxy re-encryption. Computers, Materials & Continua, 63(2), 633-647. https://doi.org/10.32604/cmc.2020.06217
Vancouver Style
Ge C, Xia J, Fang L. Key-private identity-based proxy re-encryption. Comput Mater Contin. 2020;63(2):633-647 https://doi.org/10.32604/cmc.2020.06217
IEEE Style
C. Ge, J. Xia, and L. Fang "Key-Private Identity-Based Proxy Re-Encryption," Comput. Mater. Contin., vol. 63, no. 2, pp. 633-647. 2020. https://doi.org/10.32604/cmc.2020.06217