[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

What a lovely hat

Is it made out of tin foil?

Paper 2007/361

Proxy Re-encryption Systems for Identity-based Encryption

Toshihiko Matsuo

Abstract

A proxy re-encryption system allows the proxy to transform ciphertexts encrypted under Alice's public key into the different ciphertexts that can be decrypted by Bob's secret key. In this paper, we propose new proxy re-encryption systems; one for the transformation from ciphertexts encrypted under a traditional certificate-based public key into the ciphertexts that can be decrypted by an secret key for Identity-Based Encryption, and the other one for the transformation from ciphertexts encrypted in IBE manner into the different ciphertexts that can be decrypted by the other secret key for the IBE.

Metadata
Available format(s)
PDF
Category
Public-key cryptography
Publication info
Published elsewhere. In Proceedings of Pairing-Based Cryptography - Pairing 2007, Lecture Notes in Computer Science, LNCS 4575, pages 247-267. Springer-Verlag, 2007.
Keywords
ID-based encryptionproxy re-encryption
Contact author(s)
matsuotsh @ nttdata co jp
History
2007-09-13: received
Short URL
https://ia.cr/2007/361
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2007/361,
      author = {Toshihiko Matsuo},
      title = {Proxy Re-encryption Systems for Identity-based Encryption},
      howpublished = {Cryptology {ePrint} Archive, Paper 2007/361},
      year = {2007},
      url = {https://eprint.iacr.org/2007/361}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.