2 research outputs found
New Construction of Identity-based Proxy Re-encryption
A proxy re-encryption (PRE) scheme involves three parties: Alice,
Bob, and a proxy. PRE allows the proxy to translate a ciphertext
encrypted under Alice\u27s public key into one that can be decrypted by
Bob\u27s secret key. We present a general method to construct an
identity-based proxy re-encryption scheme from an existing
identity-based encryption scheme. The transformed scheme satisfies
the properties of PRE, such as unidirectionality, non-interactivity
and multi-use. Moreover, the proposed scheme has master key
security, allows the encryptor to decide whether the ciphertext can
be re-encrypted
Cost-effective secure e-health cloud system using identity based cryptographic techniques
Nowadays E-health cloud systems are more and more widely employed. However the security of these systems needs more consideration for the sensitive health information of patients. Some protocols on how to secure the e-health cloud system have been proposed, but many of them use the traditional PKI infrastructure to implement cryptographic mechanisms, which is cumbersome for they require every user having and remembering its own public/private keys. Identity based encryption (View the MathML sourceIBE) is a cryptographic primitive which uses the identity information of the user (e.g., email address) as the public key. Hence the public key is implicitly authenticated and the certificate management is simplified. Proxy re-encryption is another cryptographic primitive which aims at transforming a ciphertext under the delegator AA into another ciphertext which can be decrypted by the delegatee BB. In this paper, we describe several identity related cryptographic techniques for securing E-health system, which include new View the MathML sourceIBE schemes, new identity based proxy re-encryption (View the MathML sourceIBPRE) schemes. We also prove these schemes’ security and give the performance analysis, the results show our View the MathML sourceIBPRE scheme is especially highly efficient for re-encryption, which can be used to achieve cost-effective cloud usage.Peer ReviewedPostprint (author's final draft