Volume -I , Issue -X, April 2015


Author(s) :

Shagoufta Taskeen , Vidyarani H. J.


Identity-based encryption (IBE) is an important primitive of identity-based cryptography. As such it is a type of public-key encryption in which the public key of a user is some unique information about the identity of the user.In an identity-based proxy re-encryption (IB-PRE) scheme, a semi-trusted proxy can convert a ciphertext under Alice’s identity into a ciphertext for Bob. The proxy does not know the secret key of Alice or Bob, and also does not know the plaintext during the conversion. However, some scenarios require handle a fine-grained delegation. In this paper, by using the identity-based encryption (IBE) technique of Boneh-Boyen, we propose a new identity-based conditional proxy re-encryption (IBCPRE) scheme, which enables Alice to implement fine-grained delegation of decryption rights, and thus is more useful in many applications. Our scheme has significant advantages in both computational and communicational than Shao et al.’s IBCPRE scheme.


peer-to-peer, broker-less, security,identity-based encryption.Proxy re-encryption, Identity-based conditional proxy re-encryption, Bilinear maps.

  1. http://en.wikipedia.org/wiki/Web_server.
  2. J. Bacon, D.M. Eyers, J. Singh, and P.R. Pietzuch, “Access Controlin Publish/Subscribe Systems,” Proc. Second ACM Int’l Conf.Distributed Event-Based Systems (DEBS),2008.
  3. J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-PolicyAttribute-Based Encryption,”Proc. IEEE Symp. Security andPrivacy,2007.
  4. E. Anceaume, M. Gradinariu, A.K. Datta, G. Simon, and A.Virgillito, “A Semantic Overlay for Self- Peer-to-Peer Publish/Subscribe,” Proc. 26th IEEE Int’l Conf. Distributed ComputingSystems (ICDCS),2006.
  5. D. Boneh and M.K. Franklin, “Identity-Based Encryption from theWeil Pairing,”Proc. Int’l Cryptology Conf. Advances in Cryptology,2001.
  6. M. Ion, G. Russello, and B. Crispo, “Supporting Publication and Subscription Confidentiality in Pub/Sub Networks,”Proc. SixthInt’l ICST Conf. Security and Privacy in Comm. Networks (Secur-eComm),2010.
  7. D. Boneh, G.D. Crescenzo, R. Ostrovsky, and G. Persiano, “PublicKey Encryption with Keyword Search,”Proc. Int’l Conf. Theory andApplications of Cryptographic Techniques on Advances in Cryptology(EUROCRYPT),2004.
  8. S. Choi, G. Ghinita, and E. Bertino, “A Privacy-EnhancingContent-Based Publish/Subscribe System Using Scalar ProductPreserving Transformations,”Proc. 21st Int’l Conf. Database andExpert Systems Applications: Part I,2010.
  9. Zhu Fande ; Inf. Eng. Coll., Yangzhou Univ., Yangzhou, China ; Chen Hongjian “µCLinux-based WEBSERVER realization on ARM platform” Computing, Communication, Control, and Management, 2009. CCCM 2009. ISECS International Colloquium on (Volume:1 ).
How to Cite this Paper? [APA Style]
Shagoufta Taskeen , Vidyarani H. J. , (2015), IDENTITY-BASED CONDITIONAL PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES FOR SECURING BROKERLESS PUBLISH/SUBSCRIBE SYSTEMS, Industrial Science Journal, http://industrialscience.org/Article.aspx?aid=68&vid=10, (April, 2015)
Full Text in PDF

Full Article in PDF Format

Comment on this article...!!!

Previous Comments...
No previous comments.


Alert Me...!!!

When new article publish, article link will mail to your mail...

Enter Your Name :
Enter Your Email ID :

For Authors

For Readers