Journal of Applied Mathematics

Time-and-ID-Based Proxy Reencryption Scheme

Kambombo Mtonga, Anand Paul, and Seungmin Rho

Full-text: Access denied (no subscription detected)

We're sorry, but we are unable to provide you with the full text of this article because we are not able to identify you as a subscriber. If you have a personal subscription to this journal, then please login. If you are already logged in, then you may need to update your profile to register your subscription. Read more about accessing full-text

Abstract

Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE) and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE). We prove that our scheme is semantically secure in the standard model.

Article information

Source
J. Appl. Math., Volume 2014 (2014), Article ID 329198, 7 pages.

Dates
First available in Project Euclid: 2 March 2015

Permanent link to this document
https://projecteuclid.org/euclid.jam/1425305786

Digital Object Identifier
doi:10.1155/2014/329198

Citation

Mtonga, Kambombo; Paul, Anand; Rho, Seungmin. Time-and-ID-Based Proxy Reencryption Scheme. J. Appl. Math. 2014 (2014), Article ID 329198, 7 pages. doi:10.1155/2014/329198. https://projecteuclid.org/euclid.jam/1425305786


Export citation

References

  • G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Transactions on Information and System Security, vol. 9, no. 1, pp. 1–30, 2006.
  • K. H. Choi, K. S. Jang, and H. J. Shin, “Smart home environment for the protection of multimedia digital contents,” The Journal of IWIT, vol. 11, no. 2, pp. 189–196, 2011.
  • C. Chu and W. Tzeng, “Identity-based proxy re-encryption without random oracles,” in Information Security, vol. 4779 of Lecture Notes in Computer Science, pp. 189–202, 2007.
  • E. B. Kim, K. I. Kim, T. H. Kim, and S. H. Cho, “A study of partial preview control method of ePUB-based eBook DRM,” The Journal of IWIT, vol. 12, no. 1, pp. 249–256, 2012.
  • G. Ateniese and S. Hohenberger, “Proxy re-signatures: new definitions, algorithms, and applications,” in Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS '05), pp. 310–319, November 2005.
  • B. Libert and D. Vergnaud, “Multi-use unidirectional proxy re-signatures,” in Proceedings of the 15th ACM conference on Computer and Communications Security (CCS '08), pp. 511–520, October 2008.
  • M. Blaze, G. Bleumer, and M. Strauss, “Divertible protocols and atomic proxy cryptography,” in Advances in cryptology–-EUROCRYPT, vol. 1403 of Lecture Notes in Computer Science, pp. 127–144, 1998.
  • T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” in Advances in Cryptology, vol. 196 of Lecture Notes in Computer Science, pp. 10–18, 1985.
  • J. Shao, Z. Cao, and P. Liu, “SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption,” Security and Communication Networks, vol. 4, no. 2, pp. 122–135, 2011.
  • J. Weng, R. H. Deng, X. Ding, C.-K. Chu, and J. Lai, “Conditional proxy re-encryption secure against chosen-ciphertext attack,” in Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security (ASIACCS '09), pp. 322–332, March 2009.
  • B. Libert and D. Vergnaud, “Unidirectional chosen-ciphertext secure proxy re-encryption,” in Public Key Cryptography–-PKC, vol. 4939 of Lecture Notes in Computer Science, pp. 360–379, 2008.
  • L. Wang, L. Wang, M. Mambo, and E. Okamoto, “New iden-tity-based proxy re-encryption schemes to prevent collusion attacks,” in Pairing-Based Cryptography-Pairing, vol. 6487 of Lecture Notes in Computer Science, pp. 327–346, 2010.
  • Z.-M. Wan, J. Weng, X.-J. Lai, S.-L. Liu, and J.-G. Li, “On the relation between identity-based proxy re-encryption and mediated identity-based encryption,” Journal of Information Science and Engineering, vol. 27, no. 1, pp. 243–259, 2011.
  • A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology–-Crypto, vol. 196 of Lecture Notes in Computer Science, pp. 47–53, 1985.
  • D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” in Advances in Cryptology–-CRYPTO, vol. 2139 of Lecture Notes in Computer Science, pp. 213–229, 2001.
  • M. Green and G. Ateniese, “Identity-based proxy re-encryp-tion,” in Proceedings of the 5th international conference on Applied Cryptography and Network Security (ACNS '07), J. Katz and M. Yung, Eds., vol. 4521, pp. 288–306, 2007.
  • C. Chu and W. Tzeng, “Identity-based proxy re-encryption without random oracles,” in Information Security, vol. 4779, pp. 189–202, 2007.
  • C. Chu, J. Weng, S. S. M. Chow, J. Zhou, and R. H. Deng, “Conditional proxy broadcast re-encryption,” in Information Security and Privacy, vol. 5594 of Lecture Notes in Computer Science, pp. 327–342, 2009.
  • T. Matsuo, “Proxy re-encryption systems for identity-based encryption,” in Pairing-Based Cryptography–-Pairing 2007, vol. 4575 of Lecture Notes in Computer Science, pp. 246–267, 2007.
  • D. Boneh and X. Boyen, “Efficient selective-ID secure identity-based encryption without random oracles,” in Advances in Cryptology–-EUROCRYPT, vol. 3027 of Lecture Notes in Computer Science, pp. 223–238, 2004.
  • L. Martin, P1363.3(TM)/D1, Draft Standard For Identity-Based Public Cryptography Using Pairings, 2008.
  • Q. Tang, “Type-based proxy re-encryption and its construction,” in Progress in Cryptology–-INDOCRYPT, vol. 5365 of Lecture Notes in Computer Science, pp. 130–144, 2008.
  • J. Weng, Y. Yang, Q. Tang, R. Deng, and F. Bao, “Efficient conditional proxy re-encryption with chosen ciphertext security,” in Information Security, P. Samarati, M. Yung, F. Martinelli, and C. A. Ardagna, Eds., vol. 5735 of Lecture Notes in Computer Science, pp. 151–166, 2009.
  • J. Weng, R. H. Deng, X. Ding, C.-K. Chu, and J. Lai, “Conditional proxy re-encryption secure against chosen-ciphertext attack,” in Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS '09), pp. 322–332, March 2009.
  • L. Ibraimi, Q. Tang, P. Hartel, and W. Jonker, “A type-and-identity-based proxy re-encryption scheme and its application in healthcare,” Secure Data Management, vol. 5159, pp. 185–198, 2008.
  • X. A. Wang, X. Yang, and Y. Han, “New identity based encryption and its proxy re-encryption,” Biomedical Engineering and Computer Science, vol. 1, no. 4, pp. 23–25, 2010.
  • S. Luo, Q. Shen, and Z. Chen, “Fully secure unidirectional identity-based proxy re-encryption,” in Proceedings of the 14th International Conference on Information Security and Cryptology, 2011.
  • A. Paul, J. C. Jiang, J. F. Wang, and J. F. Yang, “Parallel reconfigurable computing-based mapping algorithm for motion estimation in advanced video coding,” ACM Transaction on Embedded Computing Systems, vol. 11, no. S2, article 40, 2012.
  • A. Paul, “Dynamic power management for ubiquitous network devices,” Advanced Science Letters, vol. 19, no. 7, pp. 2046–2049, 2013.
  • A. Paul, “Graph based M2M Optimization in an IoT environment,” in Proceedings of the Research in Adaptive and Convergent Systems (ACM RACS '13), pp. 45–46, October 2013.
  • D. G. Lee, J. Kim, J. Sung, Y. S. Lee, and S. Rho, “Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems,” Telecommunication Systems, vol. 44, no. 3-4, pp. 297–306, 2010.
  • S. Rho and S.-S. Yeo, “Bridging the semantic gap in multimedia emotion/mood recognition for ubiquitous computing environment,” Journal of Supercomputing, vol. 56, no. 1, pp. 274–286, 2013. \endinput