Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
In order to realize the office users securely share encrypted data of the mobile terminal,an asymmetric cross-cryptosystem proxy re-encryption system is proposed.In this system,mobile terminals who have the limited computing power use relatively simple identity-based encryption system,while the serv...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
POSTS&TELECOM PRESS Co., LTD
2016-09-01
|
Series: | 网络与信息安全学报 |
Subjects: | |
Online Access: | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00099 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841530341125259264 |
---|---|
author | Wei HAO Xu-an WANG Xiao-yuan YANG Li-qiang WU |
author_facet | Wei HAO Xu-an WANG Xiao-yuan YANG Li-qiang WU |
author_sort | Wei HAO |
collection | DOAJ |
description | In order to realize the office users securely share encrypted data of the mobile terminal,an asymmetric cross-cryptosystem proxy re-encryption system is proposed.In this system,mobile terminals who have the limited computing power use relatively simple identity-based encryption system,while the server and office users use more complex identity-based broadcast encryption system.This system is based on the ciphertext conversion mechanism,which enables the simple IBE ciphertext of mobile terminal to be converted into the complex IBBE ciphertext by proxy while the proxy know nothing of the plaintext.The security of this scheme can be reduced to the safety of the IBE and IBBE scheme.Theoretical and experimental analysis indicate that the scheme is useful for the mobile ter-minal to consume less resources to make the fixed users share the data encrypted by mobile terminal,and it is more practical. |
format | Article |
id | doaj-art-0095bb347ce04126950e741abb06ed96 |
institution | Kabale University |
issn | 2096-109X |
language | English |
publishDate | 2016-09-01 |
publisher | POSTS&TELECOM PRESS Co., LTD |
record_format | Article |
series | 网络与信息安全学报 |
spelling | doaj-art-0095bb347ce04126950e741abb06ed962025-01-15T03:04:54ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-09-012495659548241Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminalWei HAOXu-an WANGXiao-yuan YANGLi-qiang WUIn order to realize the office users securely share encrypted data of the mobile terminal,an asymmetric cross-cryptosystem proxy re-encryption system is proposed.In this system,mobile terminals who have the limited computing power use relatively simple identity-based encryption system,while the server and office users use more complex identity-based broadcast encryption system.This system is based on the ciphertext conversion mechanism,which enables the simple IBE ciphertext of mobile terminal to be converted into the complex IBBE ciphertext by proxy while the proxy know nothing of the plaintext.The security of this scheme can be reduced to the safety of the IBE and IBBE scheme.Theoretical and experimental analysis indicate that the scheme is useful for the mobile ter-minal to consume less resources to make the fixed users share the data encrypted by mobile terminal,and it is more practical.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00099proxy re-encryptionidentity-based encryptionidentity-based broadcast encryptionsecurely sharing |
spellingShingle | Wei HAO Xu-an WANG Xiao-yuan YANG Li-qiang WU Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal 网络与信息安全学报 proxy re-encryption identity-based encryption identity-based broadcast encryption securely sharing |
title | Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal |
title_full | Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal |
title_fullStr | Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal |
title_full_unstemmed | Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal |
title_short | Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal |
title_sort | asymmetric proxy re encryption system achievable for office user to securely sharing outsourcing data of mobile terminal |
topic | proxy re-encryption identity-based encryption identity-based broadcast encryption securely sharing |
url | http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00099 |
work_keys_str_mv | AT weihao asymmetricproxyreencryptionsystemachievableforofficeusertosecurelysharingoutsourcingdataofmobileterminal AT xuanwang asymmetricproxyreencryptionsystemachievableforofficeusertosecurelysharingoutsourcingdataofmobileterminal AT xiaoyuanyang asymmetricproxyreencryptionsystemachievableforofficeusertosecurelysharingoutsourcingdataofmobileterminal AT liqiangwu asymmetricproxyreencryptionsystemachievableforofficeusertosecurelysharingoutsourcingdataofmobileterminal |