Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal

In order to realize the office users securely share encrypted data of the mobile terminal,an asymmetric cross-cryptosystem proxy re-encryption system is proposed.In this system,mobile terminals who have the limited computing power use relatively simple identity-based encryption system,while the serv...

Full description

Saved in:
Bibliographic Details
Main Authors: Wei HAO, Xu-an WANG, Xiao-yuan YANG, Li-qiang WU
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2016-09-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00099
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841530341125259264
author Wei HAO
Xu-an WANG
Xiao-yuan YANG
Li-qiang WU
author_facet Wei HAO
Xu-an WANG
Xiao-yuan YANG
Li-qiang WU
author_sort Wei HAO
collection DOAJ
description In order to realize the office users securely share encrypted data of the mobile terminal,an asymmetric cross-cryptosystem proxy re-encryption system is proposed.In this system,mobile terminals who have the limited computing power use relatively simple identity-based encryption system,while the server and office users use more complex identity-based broadcast encryption system.This system is based on the ciphertext conversion mechanism,which enables the simple IBE ciphertext of mobile terminal to be converted into the complex IBBE ciphertext by proxy while the proxy know nothing of the plaintext.The security of this scheme can be reduced to the safety of the IBE and IBBE scheme.Theoretical and experimental analysis indicate that the scheme is useful for the mobile ter-minal to consume less resources to make the fixed users share the data encrypted by mobile terminal,and it is more practical.
format Article
id doaj-art-0095bb347ce04126950e741abb06ed96
institution Kabale University
issn 2096-109X
language English
publishDate 2016-09-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-0095bb347ce04126950e741abb06ed962025-01-15T03:04:54ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2016-09-012495659548241Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminalWei HAOXu-an WANGXiao-yuan YANGLi-qiang WUIn order to realize the office users securely share encrypted data of the mobile terminal,an asymmetric cross-cryptosystem proxy re-encryption system is proposed.In this system,mobile terminals who have the limited computing power use relatively simple identity-based encryption system,while the server and office users use more complex identity-based broadcast encryption system.This system is based on the ciphertext conversion mechanism,which enables the simple IBE ciphertext of mobile terminal to be converted into the complex IBBE ciphertext by proxy while the proxy know nothing of the plaintext.The security of this scheme can be reduced to the safety of the IBE and IBBE scheme.Theoretical and experimental analysis indicate that the scheme is useful for the mobile ter-minal to consume less resources to make the fixed users share the data encrypted by mobile terminal,and it is more practical.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00099proxy re-encryptionidentity-based encryptionidentity-based broadcast encryptionsecurely sharing
spellingShingle Wei HAO
Xu-an WANG
Xiao-yuan YANG
Li-qiang WU
Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
网络与信息安全学报
proxy re-encryption
identity-based encryption
identity-based broadcast encryption
securely sharing
title Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
title_full Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
title_fullStr Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
title_full_unstemmed Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
title_short Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
title_sort asymmetric proxy re encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
topic proxy re-encryption
identity-based encryption
identity-based broadcast encryption
securely sharing
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2016.00099
work_keys_str_mv AT weihao asymmetricproxyreencryptionsystemachievableforofficeusertosecurelysharingoutsourcingdataofmobileterminal
AT xuanwang asymmetricproxyreencryptionsystemachievableforofficeusertosecurelysharingoutsourcingdataofmobileterminal
AT xiaoyuanyang asymmetricproxyreencryptionsystemachievableforofficeusertosecurelysharingoutsourcingdataofmobileterminal
AT liqiangwu asymmetricproxyreencryptionsystemachievableforofficeusertosecurelysharingoutsourcingdataofmobileterminal