A public key cryptosystem and a signature scheme based on discrete logarithms
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
On Quorum Controlled Asymmetric Proxy Re-encryption
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Distributed Blinding for Distributed ElGamal Re-Encryption
ICDCS '05 Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
Improved proxy re-encryption schemes with applications to secure distributed storage
ACM Transactions on Information and System Security (TISSEC)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Identity-Based Proxy Re-encryption
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
An interpretation of identity-based cryptography
Foundations of security analysis and design IV
Proxy re-encryption systems for identity-based encryption
Pairing'07 Proceedings of the First international conference on Pairing-Based Cryptography
New identity-based proxy re-encryption schemes to prevent collusion attacks
Pairing'10 Proceedings of the 4th international conference on Pairing-based cryptography
EuroPKI'10 Proceedings of the 7th European conference on Public key infrastructures, services and applications
Anonymous ID-based proxy re-encryption
ACISP'12 Proceedings of the 17th Australasian conference on Information Security and Privacy
Identity-based data storage in cloud computing
Future Generation Computer Systems
A CCA-Secure identity-based conditional proxy re-encryption without random oracles
ICISC'12 Proceedings of the 15th international conference on Information Security and Cryptology
Hi-index | 0.00 |
Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). So far, research efforts have only been devoted to the intra-domain setting, where the delegator and the delegatee are registered in the same domain. In this paper, we investigate the proxy re-encryption in the inter-domain setting, where the delegator and the delegatee are from different domains, and focus on the identity-based case. We analyze the trust relationships and possible threats to the plaintext privacy, and provide rigorous security definitions. We propose a new inter-domain identity-based proxy re-encryption scheme and prove its security in our security model. An interesting property of the proposed scheme is that, to achieve the chosen plaintext security for the delegator, the delegatee's IBE only needs to be one-way.