Paper 2006/473

Identity-Based Proxy Re-encryption

Matthew Green and Giuseppe Ateniese

Abstract

In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob {\em without} seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one {\it identity} to another. Our schemes are compatible with current IBE deployments and do not require any extra work from the IBE trusted-party key generator. In addition, they are non-interactive and one of them permits multiple re-encryptions. Their security is based on a standard assumption (DBDH) in the random oracle model.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
proxy re-encryptionidentity-based encryptionbilinear maps
Contact author(s)
mgreen @ cs jhu edu
History
2006-12-16: received
Short URL
https://ia.cr/2006/473
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2006/473,
      author = {Matthew Green and Giuseppe Ateniese},
      title = {Identity-Based Proxy Re-encryption},
      howpublished = {Cryptology ePrint Archive, Paper 2006/473},
      year = {2006},
      note = {\url{https://eprint.iacr.org/2006/473}},
      url = {https://eprint.iacr.org/2006/473}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.