Chinese Journal of Network and Information Security ›› 2016, Vol. 2 ›› Issue (9): 49-56.doi: 10.11959/j.issn.2096-109x.2016.00099

• academic paper • Previous Articles     Next Articles

Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal

Wei HAO1,2,Xu-an WANG1,2,Xiao-yuan YANG1,2(),Li-qiang WU1,2   

  1. 1 Electronic Department Engineering,College of Chinese People's Armed Police,Xi'an 710086,China
    2 Key Laboratory of Network & Information Security Engineering,College of Chinese People's Armed Police,Xi'an 710086,China
  • Revised:2016-09-03 Online:2016-09-15 Published:2020-03-26
  • Supported by:
    The National Natural Science Foundation of China(61272492);The National Natural Science Foundation of China(61572521);The Natural Science Foundation of Shaanxi Province(2014JM8300);The Basic Research Program of Engineering University of Chinese People's Armed Police(WJY201422);The Basic Research Program of Engineering University of Chinese People's Armed Police(WJY201523)

Abstract:

In order to realize the office users securely share encrypted data of the mobile terminal,an asymmetric cross-cryptosystem proxy re-encryption system is proposed.In this system,mobile terminals who have the limited computing power use relatively simple identity-based encryption system,while the server and office users use more complex identity-based broadcast encryption system.This system is based on the ciphertext conversion mechanism,which enables the simple IBE ciphertext of mobile terminal to be converted into the complex IBBE ciphertext by proxy while the proxy know nothing of the plaintext.The security of this scheme can be reduced to the safety of the IBE and IBBE scheme.Theoretical and experimental analysis indicate that the scheme is useful for the mobile ter-minal to consume less resources to make the fixed users share the data encrypted by mobile terminal,and it is more practical.

Key words: proxy re-encryption, identity-based encryption, identity-based broadcast encryption, securely sharing

CLC Number: 

No Suggested Reading articles found!