Identity-Based Proxy Re-encryption

  • Authors:
  • Matthew Green;Giuseppe Ateniese

  • Affiliations:
  • The Johns Hopkins University, Department of Computer Science, 3400 N. Charles Street/ Baltimore, MD 21218, USA;The Johns Hopkins University, Department of Computer Science, 3400 N. Charles Street/ Baltimore, MD 21218, USA

  • Venue:
  • ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

In a proxy re-encryption scheme a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. A number of solutions have been proposed in the public-key setting. In this paper, we address the problem of Identity-Based proxy re-encryption, where ciphertexts are transformed from one identityto another. Our schemes are compatible with current IBE deployments and do not require any extra work from the IBE trusted-party key generator. In addition, they are non-interactive and one of them permits multiple re-encryptions. Their security is based on a standard assumption (DBDH) in the random oracle model.