In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identity to another. Our schemes are compatible with current IBE deployments and do not require any extra work from the IBE trusted-party key generator. In addition, they are non-interactive and one of them permits multiple re-encryptions. Their security is based on a standard assumption (DBDH) in the random oracle model. © Springer-Verlag Berlin Heidelberg 2007.
CITATION STYLE
Green, M., & Ateniese, G. (2007). Identity-based proxy re-encryption. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4521 LNCS, pp. 288–306). Springer Verlag. https://doi.org/10.1007/978-3-540-72738-5_19
Mendeley helps you to discover research relevant for your work.