Table of Content

Open Access iconOpen Access

ARTICLE

Key-Private Identity-Based Proxy Re-Encryption

Chunpeng Ge1, *, Jinyue Xia2, Liming Fang1

1 College of Computer Science and Technology, Nanjing University of Aeronautics and Astronautics, Nanjing, 210000, China.
2 IBM, Research Triangle Park, North Carolina, 27709, USA.

* Corresponding Author: Chunpeng Ge. Email: email.

Computers, Materials & Continua 2020, 63(2), 633-647. https://doi.org/10.32604/cmc.2020.06217

Abstract

An identity-based proxy re-encryption scheme (IB-PRE) allows a semi-trusted proxy to convert an encryption under one identity to another without revealing the underlying message. Due to the fact that the proxy was semi-trusted, it should place as little trust as necessary to allow it to perform the translations. In some applications such as distributed file system, it demands the adversary cannot identify the sender and recipient’s identities. However, none of the exiting IB-PRE schemes satisfy this requirement. In this work, we first define the security model of key-private IB-PRE. Finally, we propose the first key-private IB-PRE scheme. Our scheme is chosen plaintext secure (CPA) and collusion resistant in the standard model.

Keywords


Cite This Article

APA Style
Ge, C., Xia, J., Fang, L. (2020). Key-private identity-based proxy re-encryption. Computers, Materials & Continua, 63(2), 633-647. https://doi.org/10.32604/cmc.2020.06217
Vancouver Style
Ge C, Xia J, Fang L. Key-private identity-based proxy re-encryption. Comput Mater Contin. 2020;63(2):633-647 https://doi.org/10.32604/cmc.2020.06217
IEEE Style
C. Ge, J. Xia, and L. Fang, “Key-Private Identity-Based Proxy Re-Encryption,” Comput. Mater. Contin., vol. 63, no. 2, pp. 633-647, 2020. https://doi.org/10.32604/cmc.2020.06217



cc Copyright © 2020 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1899

    View

  • 1361

    Download

  • 0

    Like

Related articles

Share Link