ID-based proxy re-signcryption scheme
Combining the idea of signcryption, a proxy re-signcryption scheme based on identity is proposed. This scheme is a primitive that allows a semi-trusted entity called the "proxy" to convert the signcryption addressed to a "delegator" to those that can be de-signcrypted by a "...
Saved in:
| Published in: | 2011 IEEE International Conference on Computer Science and Automation Engineering Vol. 2; pp. 317 - 321 |
|---|---|
| Main Authors: | , , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
01.06.2011
|
| Subjects: | |
| ISBN: | 9781424487271, 1424487277 |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | Combining the idea of signcryption, a proxy re-signcryption scheme based on identity is proposed. This scheme is a primitive that allows a semi-trusted entity called the "proxy" to convert the signcryption addressed to a "delegator" to those that can be de-signcrypted by a "delegatee", by using some special information given by the delegator, called "rekey". In the scheme, the proxy is not allowed to know the secret keys of the delegator or the delegatee, or the plaintext during the conversion. The proxy and delegatee, however, are not allowed to collude with each other. Compared to the existing scheme, the proxy re-signcryption proposed by us implements the full conversion-a signcryption under the keys for two parties can be transferred to another signcryption under another different two keys, and the verification of the signcryption can be progressed without the participation of plaintext. Meanwhile, the security of the scheme is proved under the ROM. Finally, we give the analysis of the efficiency, performance and the function of the scheme, which proves that the function of our scheme is stronger and more perfect than that of the existing schemes. |
|---|---|
| AbstractList | Combining the idea of signcryption, a proxy re-signcryption scheme based on identity is proposed. This scheme is a primitive that allows a semi-trusted entity called the "proxy" to convert the signcryption addressed to a "delegator" to those that can be de-signcrypted by a "delegatee", by using some special information given by the delegator, called "rekey". In the scheme, the proxy is not allowed to know the secret keys of the delegator or the delegatee, or the plaintext during the conversion. The proxy and delegatee, however, are not allowed to collude with each other. Compared to the existing scheme, the proxy re-signcryption proposed by us implements the full conversion-a signcryption under the keys for two parties can be transferred to another signcryption under another different two keys, and the verification of the signcryption can be progressed without the participation of plaintext. Meanwhile, the security of the scheme is proved under the ROM. Finally, we give the analysis of the efficiency, performance and the function of the scheme, which proves that the function of our scheme is stronger and more perfect than that of the existing schemes. |
| Author | Wang Caifen Cao Hao Wang Huige |
| Author_xml | – sequence: 1 surname: Wang Huige fullname: Wang Huige email: whgexf@163.com organization: Comput. Dept., AnHui Sci. & Technol. Univ., Fengyang, China – sequence: 2 surname: Wang Caifen fullname: Wang Caifen email: wangef@nwnu.edu.cn organization: Comput. Dept., Northwest Normal Univ., Lanzhou, China – sequence: 3 surname: Cao Hao fullname: Cao Hao email: caohao2000854@163.com organization: Comput. Dept., AnHui Sci. & Technol. Univ., Fengyang, China |
| BookMark | eNpVjz1PwzAYhI0ACSj5AYglC2PS1x_xx1iFApUqdaB7ZTtvwIgmkd2B_Hss0YVbTiedTs_dkathHJCQBwo1pWCW7ftqXTOgtG5Mw4TSF6QwSlPBhNCKSXH5Lyt6Q4qUviBLSm04vSVPm-fK2YRdOcXxZy4jVil8DD7O0ymMQ5n8Jx7xnlz39jthcfYF2b-s9-1btd29btrVtgoGTpW1RvWMZw6NApzutessSA4NIKKjzrqMzbwUwtqMxF1jrOnQe9OD7BxfkMe_2ZD7hymGo43z4fyN_wIgw0MS |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/CSAE.2011.5952478 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings Accès UT - IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9781424487264 1424487269 9781424487288 1424487285 |
| EndPage | 321 |
| ExternalDocumentID | 5952478 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
| ID | FETCH-LOGICAL-i90t-aa97f234788e40b8f8bda063050eeeb1bab1102c644aa2443b59a9decc9f06db3 |
| IEDL.DBID | RIE |
| ISBN | 9781424487271 1424487277 |
| IngestDate | Wed Aug 27 03:03:06 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i90t-aa97f234788e40b8f8bda063050eeeb1bab1102c644aa2443b59a9decc9f06db3 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_5952478 |
| PublicationCentury | 2000 |
| PublicationDate | 2011-June |
| PublicationDateYYYYMMDD | 2011-06-01 |
| PublicationDate_xml | – month: 06 year: 2011 text: 2011-June |
| PublicationDecade | 2010 |
| PublicationTitle | 2011 IEEE International Conference on Computer Science and Automation Engineering |
| PublicationTitleAbbrev | CSAE |
| PublicationYear | 2011 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000668931 |
| Score | 1.5273178 |
| Snippet | Combining the idea of signcryption, a proxy re-signcryption scheme based on identity is proposed. This scheme is a primitive that allows a semi-trusted entity... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 317 |
| SubjectTerms | bilinear map Games ID-based cryptosystem Polynomials Public key random oracle model re-signcryption Read only memory signcryption Silicon |
| Title | ID-based proxy re-signcryption scheme |
| URI | https://ieeexplore.ieee.org/document/5952478 |
| Volume | 2 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB7a4sGTSiu-2YPejN3sbjbJUWqLgpSCRXoreUygB1tZW8F_b5LdVgQv3pIcwgyB-TKvbwCueYGonLGEuphmFM7bQSlJJlEyzXNksTbn9ZmPx2I2k5MW3O56YRAxFp_hXVjGXL5dmU0IlfWZZFnBRRvanJd1r9YunuKh00Mv3fZuCY_LfEvp1Oxpk9WkqewPXu6HNYFnc-mv6SoRXEYH_xPrEHo_XXrJZIc_R9DCZRdunh5IQCabxAKVpEISSjRM9RVtQ-KdWXzDHkxHw-ngkTSjEMhCpmuilOQuywPVPRapFk5oqwJbFku9NJpqpb1WmfGfG6W8trlmUknrn0e6tLQ6P4bOcrXEE0hKJYRzRojCCx1mDVPrvQpunHCMKlWeQjdoOH-vyS7mjXJnfx-fw34dZA1hiQvorKsNXsKe-VwvPqqr-ELfgxuM8A |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5qFfSk0opv96A3Y_eVJjmKtrRYS8EivZU8JtCDrayt4L83yW4rghdvSQ5hhsB8mdc3ANcsR5RWG5LYkGbk1tlBIUgqUFDFMqShNud1wIZDPpmIUQ1uN70wiBiKz_DOL0Mu3yz0yofKWlTQNGd8C7Zpnqdx2a21iag48HTgm6y7t7hDZrYmdar2SZXXTGLReni575QUntW1v-arBHjp7v9PsANo_vTpRaMNAh1CDecNuOk_Eo9NJgolKlGBxBdp6OIrWIfIubP4hk0Ydzvjhx6phiGQmYiXRErBbJp5snvMY8UtV0Z6viwaO2lUoqRyWqXafW-kdNpmigopjHsgYeO2UdkR1OeLOR5D1JacW6s5z53QftpwYpxfwbTlliZStk-g4TWcvpd0F9NKudO_j69gtzd-HkwH_eHTGeyVIVcfpDiH-rJY4QXs6M_l7KO4DK_1DREBkDc |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2011+IEEE+International+Conference+on+Computer+Science+and+Automation+Engineering&rft.atitle=ID-based+proxy+re-signcryption+scheme&rft.au=Wang+Huige&rft.au=Wang+Caifen&rft.au=Cao+Hao&rft.date=2011-06-01&rft.pub=IEEE&rft.isbn=9781424487271&rft.volume=2&rft.spage=317&rft.epage=321&rft_id=info:doi/10.1109%2FCSAE.2011.5952478&rft.externalDocID=5952478 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424487271/lc.gif&client=summon&freeimage=true |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424487271/mc.gif&client=summon&freeimage=true |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424487271/sc.gif&client=summon&freeimage=true |

