A Timed-Release Proxy Re-Encryption Scheme

被引:16
|
作者
Emura, Keita [1 ]
Miyaji, Atsuko [2 ]
Omote, Kazumasa [2 ]
机构
[1] Japan Adv Inst Sci & Technol, Ctr Highly Dependable Embedded Syst Technol, Nomi 9231292, Japan
[2] JAIST, Sch Informat Sci, Nomi, Ishikawa 9231292, Japan
关键词
timed-release encryption; proxy re-encryption;
D O I
10.1587/transfun.E94.A.1682
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Timed-Release Encryption (TRE) is a kind of time-dependent encryption, where the time of decryption can be controlled. More precisely, TRE prevents even a legitimate recipient decrypting a ciphertext before a semi-trusted Time Server (TS) sends trapdoor S-T assigned with a release time T of the encryptor's choice. Cathalo et al. (ICICS2005) and Chalkias et al. (ESORICS2007) have already considered encrypting a message intended for multiple recipients with the same release time. One drawback of these schemes is the ciphertext size and computational complexity, which depend on the number of recipients N. Ideally, it is desirable that any factor (ciphertext size, computational complexity of encryption/decryption, and public/secret key size) does not depend on N. In this paper, to achieve TRE with such fully constant costs from the encryptor's/decryptor's point of view, by borrowing the technique of Proxy Re-Encryption (PRE), we propose a cryptosystem in which even if the proxy transformation is applied to a TRE ciphertext, the release time is still effective. By sending a TRE ciphertext to the proxy, an encryptor can foist N-dependent computation costs on the proxy. We call this cryptosystem Timed-Release PRE (TR-PRE). This function can be applied to efficient multicast communication with a release time indication.
引用
收藏
页码:1682 / 1695
页数:14
相关论文
共 50 条
  • [21] Proxy Re-encryption Scheme Based on SK Identity Based Encryption
    Wang, Xu An
    Yang, Xiaoyuan
    FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 657 - 660
  • [22] A Multi-users Searchable Encryption Scheme with Proxy Re-encryption
    Zhang Ya-ling
    Liu Kai
    Wang Shang-ping
    Sun Qin-dong
    2014 TENTH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2014, : 563 - 567
  • [23] General Certificateless Encryption and Timed-Release Encryption
    Chow, Sherman S. M.
    Roth, Volker
    Rieffel, Eleanor G.
    SECURITY AND CRYPTOGRAPHY FOR NETWORKS, PROCEEDINGS, 2008, 5229 : 126 - +
  • [24] Hybrid Proxy Re-encryption Scheme for Attribute-Based Encryption
    Mizuno, Takeo
    Doi, Hiroshi
    INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 288 - +
  • [25] Revocable Quantum Timed-Release Encryption
    Unruh, Dominique
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2014, 2014, 8441 : 129 - 146
  • [26] Revocable Quantum Timed-Release Encryption
    Unruh, Dominique
    JOURNAL OF THE ACM, 2015, 62 (06)
  • [27] Combined Proxy Re-encryption
    Canard, Sebastien
    Devigne, Julien
    INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2013, 2014, 8565 : 49 - 66
  • [28] Anonymous proxy re-encryption
    Shao, Jun
    Liu, Peng
    Wei, Guiyi
    Ling, Yun
    SECURITY AND COMMUNICATION NETWORKS, 2012, 5 (05) : 439 - 449
  • [29] Improved anonymous timed-release encryption
    Chalkias, Konstantinos
    Hristu-Varsakelis, Dimitrios
    Stephanides, George
    COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 311 - +
  • [30] Improved Proxy Re-encryption Scheme for Symmetric Key Cryptography
    Syalim, Amril
    Nishide, Takashi
    Sakurai, Kouichi
    2017 INTERNATIONAL WORKSHOP ON BIG DATA AND INFORMATION SECURITY (IWBIS 2017), 2017, : 105 - 111