ID-based proxy re-signcryption scheme

Combining the idea of signcryption, a proxy re-signcryption scheme based on identity is proposed. This scheme is a primitive that allows a semi-trusted entity called the "proxy" to convert the signcryption addressed to a "delegator" to those that can be de-signcrypted by a "...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2011 IEEE International Conference on Computer Science and Automation Engineering Ročník 2; s. 317 - 321
Hlavní autoři: Wang Huige, Wang Caifen, Cao Hao
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 01.06.2011
Témata:
ISBN:9781424487271, 1424487277
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Popis
Shrnutí:Combining the idea of signcryption, a proxy re-signcryption scheme based on identity is proposed. This scheme is a primitive that allows a semi-trusted entity called the "proxy" to convert the signcryption addressed to a "delegator" to those that can be de-signcrypted by a "delegatee", by using some special information given by the delegator, called "rekey". In the scheme, the proxy is not allowed to know the secret keys of the delegator or the delegatee, or the plaintext during the conversion. The proxy and delegatee, however, are not allowed to collude with each other. Compared to the existing scheme, the proxy re-signcryption proposed by us implements the full conversion-a signcryption under the keys for two parties can be transferred to another signcryption under another different two keys, and the verification of the signcryption can be progressed without the participation of plaintext. Meanwhile, the security of the scheme is proved under the ROM. Finally, we give the analysis of the efficiency, performance and the function of the scheme, which proves that the function of our scheme is stronger and more perfect than that of the existing schemes.
ISBN:9781424487271
1424487277
DOI:10.1109/CSAE.2011.5952478