Proxy re-encryption systems for identity-based encryption

139Citations
Citations of this article
34Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice's public key into the different ciphertexts that can be decrypted by Bob's secret key. In this paper, we propose new proxy re-encryption systems; one for the transformation from ciphertexts encrypted under a traditional PKI-based public key into the ciphertexts that can be decrypted by an secret key for Identity-Based Encryption, and the other one for the transformation from ciphertexts encrypted in IBE manner into the different ciphertexts that can be decrypted by the other secret key for the IBE. © 2007 Springer-Verlag Berlin Heidelberg.

Cite

CITATION STYLE

APA

Matsuo, T. (2007). Proxy re-encryption systems for identity-based encryption. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4575 LNCS, pp. 247–267). https://doi.org/10.1007/978-3-540-73489-5_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free