Font Size: a A A

The Research And Implement Of Identity-based Proxy Re-encryption Email System

Posted on:2017-04-03Degree:MasterType:Thesis
Country:ChinaCandidate:X X WenFull Text:PDF
GTID:2348330512951080Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Identity-based Encryption(IBE)takes a arbitrary string that is publicly available to the user as a public key to encrypt the information that needs to be encrypted.At the same time,the key management process of Key Infrastructure Public(PKI)is simplified by not using any certificate in the identity-based encryption scheme.Proxy re-encryption(PRE)allows the proxy to translate a ciphertext encrypted under delegator's public key into another ciphertext that can be decrypted by delegatee's secret key.Identity-based proxy re-encryption(IB-PRE)is the development of identity-based encryption and proxy re-encryption,where ciphertexts are transformed from one identity to another.Identity-based proxy re-encryption can be used in many practical scenarios,such as email forwarding,distributed file system,and so all.In this paper,we firstly study identity-based proxy re-encryption cryptography and introduce an unidirectional single-hop identity-based proxy re-encryption scheme which is based on bilinear pairing,and is proved secure in the standard model.We also introduce the basic theory of bilinear pairing and Java Pairing-Based Cryptography Library(JPBC Java)which is developed by Lynn Ben.The library is directly implemented on bilinear groups and can execute the mathematical operations about the pairing-based cryptogryphy in java language.Finally according to identity-based proxy re-encryption system,the theory of the bilinear pairing,Java Pairing-Based Cryptography Library,and mail theories,which includes the mail format,mail protocol and message transmission principle,we design secure e-mail system basic structure based on identity based proxy re encryption,and ultimately achieve the identity-based proxy re-encryption secure e-mail system.
Keywords/Search Tags:identity-based proxy re-encryption, bilinear pairing, e-mail system
PDF Full Text Request
Related items