ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

PROXY RE-ENCRYPTION USING HYBRID ENCRYPTION SCHEME SECURE AGAINST CHOSEN CIPHERTEXT ATTACK

Journal: International Journal of Computer Science and Mobile Applications IJCSMA (Vol.2, No. 1)

Publication Date:

Authors : ;

Page : 94-100

Keywords : ;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The objective is to present the unidirectional proxy re-encryption scheme with chosen-cipher text security. The goal of Proxy Re-Encryption system is to securely enable the re-encryption of cipher texts from one key to another, without relying on trusted parties. A Proxy can transform - without seeing the Plaintext - cipher text encrypted under one key into an encryption of the same plaintext under another key. Proxy Re-Encryption is a form of public-key encryption that allows a user Alice to "delegate" her decryption rights to another user Bob. In a PRE scheme, a proxy is given a piece of information that allows turning a cipher text encrypted under a given public key into an encryption of the same message under a different key.

Last modified: 2014-01-25 22:33:49