Sciweavers

ISW
2007
Springer

Identity-Based Proxy Re-encryption Without Random Oracles

14 years 6 months ago
Identity-Based Proxy Re-encryption Without Random Oracles
A proxy re-encryption scheme allows Alice to temporarily delegate the decryption rights to Bob via a proxy. Alice gives the proxy a re-encryption key so that the proxy can convert a ciphertext for Alice into the ciphertext for Bob. In this paper, we propose two identity-based proxy re-encryption schemes, which are both proved secure in the standard model. The first one is efficient in both computation and ciphertext length, and the other one achieves chosen-ciphertext security. Our solutions answer the open problems left in the previous work.
Cheng-Kang Chu, Wen-Guey Tzeng
Added 08 Jun 2010
Updated 08 Jun 2010
Type Conference
Year 2007
Where ISW
Authors Cheng-Kang Chu, Wen-Guey Tzeng
Comments (0)