ID-based proxy re-signcryption scheme

Combining the idea of signcryption, a proxy re-signcryption scheme based on identity is proposed. This scheme is a primitive that allows a semi-trusted entity called the "proxy" to convert the signcryption addressed to a "delegator" to those that can be de-signcrypted by a "...

Full description

Saved in:
Bibliographic Details
Published in:2011 IEEE International Conference on Computer Science and Automation Engineering Vol. 2; pp. 317 - 321
Main Authors: Wang Huige, Wang Caifen, Cao Hao
Format: Conference Proceeding
Language:English
Published: IEEE 01.06.2011
Subjects:
ISBN:9781424487271, 1424487277
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract Combining the idea of signcryption, a proxy re-signcryption scheme based on identity is proposed. This scheme is a primitive that allows a semi-trusted entity called the "proxy" to convert the signcryption addressed to a "delegator" to those that can be de-signcrypted by a "delegatee", by using some special information given by the delegator, called "rekey". In the scheme, the proxy is not allowed to know the secret keys of the delegator or the delegatee, or the plaintext during the conversion. The proxy and delegatee, however, are not allowed to collude with each other. Compared to the existing scheme, the proxy re-signcryption proposed by us implements the full conversion-a signcryption under the keys for two parties can be transferred to another signcryption under another different two keys, and the verification of the signcryption can be progressed without the participation of plaintext. Meanwhile, the security of the scheme is proved under the ROM. Finally, we give the analysis of the efficiency, performance and the function of the scheme, which proves that the function of our scheme is stronger and more perfect than that of the existing schemes.
AbstractList Combining the idea of signcryption, a proxy re-signcryption scheme based on identity is proposed. This scheme is a primitive that allows a semi-trusted entity called the "proxy" to convert the signcryption addressed to a "delegator" to those that can be de-signcrypted by a "delegatee", by using some special information given by the delegator, called "rekey". In the scheme, the proxy is not allowed to know the secret keys of the delegator or the delegatee, or the plaintext during the conversion. The proxy and delegatee, however, are not allowed to collude with each other. Compared to the existing scheme, the proxy re-signcryption proposed by us implements the full conversion-a signcryption under the keys for two parties can be transferred to another signcryption under another different two keys, and the verification of the signcryption can be progressed without the participation of plaintext. Meanwhile, the security of the scheme is proved under the ROM. Finally, we give the analysis of the efficiency, performance and the function of the scheme, which proves that the function of our scheme is stronger and more perfect than that of the existing schemes.
Author Wang Caifen
Cao Hao
Wang Huige
Author_xml – sequence: 1
  surname: Wang Huige
  fullname: Wang Huige
  email: whgexf@163.com
  organization: Comput. Dept., AnHui Sci. & Technol. Univ., Fengyang, China
– sequence: 2
  surname: Wang Caifen
  fullname: Wang Caifen
  email: wangef@nwnu.edu.cn
  organization: Comput. Dept., Northwest Normal Univ., Lanzhou, China
– sequence: 3
  surname: Cao Hao
  fullname: Cao Hao
  email: caohao2000854@163.com
  organization: Comput. Dept., AnHui Sci. & Technol. Univ., Fengyang, China
BookMark eNpVjz1PwzAYhI0ACSj5AYglC2PS1x_xx1iFApUqdaB7ZTtvwIgmkd2B_Hss0YVbTiedTs_dkathHJCQBwo1pWCW7ftqXTOgtG5Mw4TSF6QwSlPBhNCKSXH5Lyt6Q4qUviBLSm04vSVPm-fK2YRdOcXxZy4jVil8DD7O0ymMQ5n8Jx7xnlz39jthcfYF2b-s9-1btd29btrVtgoGTpW1RvWMZw6NApzutessSA4NIKKjzrqMzbwUwtqMxF1jrOnQe9OD7BxfkMe_2ZD7hymGo43z4fyN_wIgw0MS
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CSAE.2011.5952478
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
Accès UT - IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781424487264
1424487269
9781424487288
1424487285
EndPage 321
ExternalDocumentID 5952478
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i90t-aa97f234788e40b8f8bda063050eeeb1bab1102c644aa2443b59a9decc9f06db3
IEDL.DBID RIE
ISBN 9781424487271
1424487277
IngestDate Wed Aug 27 03:03:06 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i90t-aa97f234788e40b8f8bda063050eeeb1bab1102c644aa2443b59a9decc9f06db3
PageCount 5
ParticipantIDs ieee_primary_5952478
PublicationCentury 2000
PublicationDate 2011-June
PublicationDateYYYYMMDD 2011-06-01
PublicationDate_xml – month: 06
  year: 2011
  text: 2011-June
PublicationDecade 2010
PublicationTitle 2011 IEEE International Conference on Computer Science and Automation Engineering
PublicationTitleAbbrev CSAE
PublicationYear 2011
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000668931
Score 1.5273178
Snippet Combining the idea of signcryption, a proxy re-signcryption scheme based on identity is proposed. This scheme is a primitive that allows a semi-trusted entity...
SourceID ieee
SourceType Publisher
StartPage 317
SubjectTerms bilinear map
Games
ID-based cryptosystem
Polynomials
Public key
random oracle model
re-signcryption
Read only memory
signcryption
Silicon
Title ID-based proxy re-signcryption scheme
URI https://ieeexplore.ieee.org/document/5952478
Volume 2
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB7a4sGTSiu-2YPejN3sbjbJUWqLgpSCRXoreUygB1tZW8F_b5LdVgQv3pIcwgyB-TKvbwCueYGonLGEuphmFM7bQSlJJlEyzXNksTbn9ZmPx2I2k5MW3O56YRAxFp_hXVjGXL5dmU0IlfWZZFnBRRvanJd1r9YunuKh00Mv3fZuCY_LfEvp1Oxpk9WkqewPXu6HNYFnc-mv6SoRXEYH_xPrEHo_XXrJZIc_R9DCZRdunh5IQCabxAKVpEISSjRM9RVtQ-KdWXzDHkxHw-ngkTSjEMhCpmuilOQuywPVPRapFk5oqwJbFku9NJpqpb1WmfGfG6W8trlmUknrn0e6tLQ6P4bOcrXEE0hKJYRzRojCCx1mDVPrvQpunHCMKlWeQjdoOH-vyS7mjXJnfx-fw34dZA1hiQvorKsNXsKe-VwvPqqr-ELfgxuM8A
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB5qFfSk0opv96A3Y_eVJjmKtrRYS8EivZU8JtCDrayt4L83yW4rghdvSQ5hhsB8mdc3ANcsR5RWG5LYkGbk1tlBIUgqUFDFMqShNud1wIZDPpmIUQ1uN70wiBiKz_DOL0Mu3yz0yofKWlTQNGd8C7Zpnqdx2a21iag48HTgm6y7t7hDZrYmdar2SZXXTGLReni575QUntW1v-arBHjp7v9PsANo_vTpRaMNAh1CDecNuOk_Eo9NJgolKlGBxBdp6OIrWIfIubP4hk0Ydzvjhx6phiGQmYiXRErBbJp5snvMY8UtV0Z6viwaO2lUoqRyWqXafW-kdNpmigopjHsgYeO2UdkR1OeLOR5D1JacW6s5z53QftpwYpxfwbTlliZStk-g4TWcvpd0F9NKudO_j69gtzd-HkwH_eHTGeyVIVcfpDiH-rJY4QXs6M_l7KO4DK_1DREBkDc
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2011+IEEE+International+Conference+on+Computer+Science+and+Automation+Engineering&rft.atitle=ID-based+proxy+re-signcryption+scheme&rft.au=Wang+Huige&rft.au=Wang+Caifen&rft.au=Cao+Hao&rft.date=2011-06-01&rft.pub=IEEE&rft.isbn=9781424487271&rft.volume=2&rft.spage=317&rft.epage=321&rft_id=info:doi/10.1109%2FCSAE.2011.5952478&rft.externalDocID=5952478
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424487271/lc.gif&client=summon&freeimage=true
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424487271/mc.gif&client=summon&freeimage=true
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=9781424487271/sc.gif&client=summon&freeimage=true