File Download
  Links for fulltext
     (May Require Subscription)
Supplementary

Conference Paper: Non-Transferable Proxy Re-Encryption Scheme

TitleNon-Transferable Proxy Re-Encryption Scheme
Authors
Issue Date2012
PublisherI E E E. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1002526
Citation
The 5th IFIP International Conference on New Technologies, Mobility and Security (NTMS’12), Istanbul, Turkey, 7-10 May 2012. In Proceedings of the International Conference on New Technologies, Mobility and Security, 2012, p. article no. 6208714 How to Cite?
AbstractA proxy re-encryption (PRE) scheme allows a proxy to re-encrypt a ciphertext for Alice (delegator) to a ciphertext for Bob (delegatee) without seeing the underlying plaintext. However, existing PRE schemes generally suffer from at least one of the followings. Some schemes fail to provide the non-transferable property in which the proxy and the delegatee can collude to further delegate the decryption right to anyone. This is the main open problem left for PRE schemes. Other schemes assume the existence of a fully trusted private key generator (PKG) to generate the re-encryption key to be used by the proxy for re-encrypting a given ciphertext for a target delegatee. But this poses two problems in PRE schemes if the PKG is malicious: the PKG in their schemes may decrypt both original ciphertexts and re-encrypted ciphertexts (referred as the key escrow problem); and the PKG can generate reencryption key for arbitrary delegatees without permission from the delegator (we refer to it as the PKG despotism problem). In this paper, we propose the first non-transferable proxy re-encryption scheme which successfully achieves the nontransferable property. We show that the new scheme solved the PKG despotism problem and key escrow problem as well. © 2012 IEEE.
DescriptionSEC8: Selected topics in Information Security
Persistent Identifierhttp://hdl.handle.net/10722/192710
ISBN
ISSN

 

DC FieldValueLanguage
dc.contributor.authorHe, Yen_US
dc.contributor.authorChim, TWen_US
dc.contributor.authorHui, CKen_US
dc.contributor.authorYiu, SMen_US
dc.date.accessioned2013-11-20T04:56:56Z-
dc.date.available2013-11-20T04:56:56Z-
dc.date.issued2012en_US
dc.identifier.citationThe 5th IFIP International Conference on New Technologies, Mobility and Security (NTMS’12), Istanbul, Turkey, 7-10 May 2012. In Proceedings of the International Conference on New Technologies, Mobility and Security, 2012, p. article no. 6208714en_US
dc.identifier.isbn9781467302289-
dc.identifier.issn2157-4952-
dc.identifier.urihttp://hdl.handle.net/10722/192710-
dc.descriptionSEC8: Selected topics in Information Security-
dc.description.abstractA proxy re-encryption (PRE) scheme allows a proxy to re-encrypt a ciphertext for Alice (delegator) to a ciphertext for Bob (delegatee) without seeing the underlying plaintext. However, existing PRE schemes generally suffer from at least one of the followings. Some schemes fail to provide the non-transferable property in which the proxy and the delegatee can collude to further delegate the decryption right to anyone. This is the main open problem left for PRE schemes. Other schemes assume the existence of a fully trusted private key generator (PKG) to generate the re-encryption key to be used by the proxy for re-encrypting a given ciphertext for a target delegatee. But this poses two problems in PRE schemes if the PKG is malicious: the PKG in their schemes may decrypt both original ciphertexts and re-encrypted ciphertexts (referred as the key escrow problem); and the PKG can generate reencryption key for arbitrary delegatees without permission from the delegator (we refer to it as the PKG despotism problem). In this paper, we propose the first non-transferable proxy re-encryption scheme which successfully achieves the nontransferable property. We show that the new scheme solved the PKG despotism problem and key escrow problem as well. © 2012 IEEE.en_US
dc.languageengen_US
dc.publisherI E E E. The Journal's web site is located at http://ieeexplore.ieee.org/xpl/conhome.jsp?punumber=1002526-
dc.relation.ispartofProceedings of the International Conference on New Technologies, Mobility and Securityen_US
dc.rightsProceedings of the International Conference on New Technologies, Mobility and Security. Copyright © I E E E.-
dc.rights©2012 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists, or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.-
dc.rightsCreative Commons: Attribution 3.0 Hong Kong License-
dc.titleNon-Transferable Proxy Re-Encryption Schemeen_US
dc.typeConference_Paperen_US
dc.identifier.emailChim, TW: chimtw@hkucc.hku.hk-
dc.identifier.emailHui, CK: hui@cs.hku.hk-
dc.identifier.emailYiu, SM: smyiu@cs.hku.hk-
dc.description.naturepublished_or_final_versionen_US
dc.identifier.doi10.1109/NTMS.2012.6208714en_US
dc.identifier.scopuseid_2-s2.0-84863979758-
dc.identifier.hkuros211614-
dc.identifier.spagearticle no. 6208714-
dc.identifier.epagearticle no. 6208714-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats