A Timed-Release Proxy Re-Encryption Scheme

被引:16
|
作者
Emura, Keita [1 ]
Miyaji, Atsuko [2 ]
Omote, Kazumasa [2 ]
机构
[1] Japan Adv Inst Sci & Technol, Ctr Highly Dependable Embedded Syst Technol, Nomi 9231292, Japan
[2] JAIST, Sch Informat Sci, Nomi, Ishikawa 9231292, Japan
关键词
timed-release encryption; proxy re-encryption;
D O I
10.1587/transfun.E94.A.1682
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Timed-Release Encryption (TRE) is a kind of time-dependent encryption, where the time of decryption can be controlled. More precisely, TRE prevents even a legitimate recipient decrypting a ciphertext before a semi-trusted Time Server (TS) sends trapdoor S-T assigned with a release time T of the encryptor's choice. Cathalo et al. (ICICS2005) and Chalkias et al. (ESORICS2007) have already considered encrypting a message intended for multiple recipients with the same release time. One drawback of these schemes is the ciphertext size and computational complexity, which depend on the number of recipients N. Ideally, it is desirable that any factor (ciphertext size, computational complexity of encryption/decryption, and public/secret key size) does not depend on N. In this paper, to achieve TRE with such fully constant costs from the encryptor's/decryptor's point of view, by borrowing the technique of Proxy Re-Encryption (PRE), we propose a cryptosystem in which even if the proxy transformation is applied to a TRE ciphertext, the release time is still effective. By sending a TRE ciphertext to the proxy, an encryptor can foist N-dependent computation costs on the proxy. We call this cryptosystem Timed-Release PRE (TR-PRE). This function can be applied to efficient multicast communication with a release time indication.
引用
收藏
页码:1682 / 1695
页数:14
相关论文
共 50 条
  • [31] An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing
    Selvi, S. Sharmila Deva
    Paul, Arinjita
    Rangan, Chandrasekaran Pandu
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 413 - 433
  • [32] A proxy re-encryption scheme based on elliptic curve group
    Yin, Shou-Lin (352720214@qq.com), 1600, Ubiquitous International (08):
  • [33] A new RSA-based proxy re-encryption scheme
    Wang, Liangliang
    Chen, Kefei
    Long, Yu
    Mao, Xianping
    Journal of Computational Information Systems, 2015, 11 (02): : 567 - 575
  • [34] A Proxy Re-Encryption with Keyword Search Scheme in Cloud Computing
    Tang, Yongli
    Lian, Huanhuan
    Zhao, Zemao
    Yan, Xixi
    CMC-COMPUTERS MATERIALS & CONTINUA, 2018, 56 (02): : 339 - 352
  • [35] A BGN-Type Homomorphic Proxy Re-Encryption Scheme
    Liu, Shu-Guang
    Zhang, Wei
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 226 - 229
  • [36] Non-transitive Bidirectional Proxy Re-encryption Scheme
    Zhang, Jindan
    Wang, Xu An
    2009 INTERNATIONAL CONFERENCE ON NETWORKING AND DIGITAL SOCIETY, VOL 1, PROCEEDINGS, 2009, : 213 - 216
  • [37] Group-based unidirectional proxy re-encryption scheme
    School of Information and Communication, Guilin University of Electronic and Technology, Guilin, Guangxi, 541004, China
    Inf. Technol. J., 2009, 1 (83-88):
  • [38] Identity Based Proxy Re-encryption Scheme under LWE
    Yin, Wei
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zheng Ping
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12): : 6116 - 6132
  • [39] A Symmetric Authenticated Proxy Re-encryption Scheme with Provable Security
    Peng, Zhiniang
    Tang, Shaohua
    Jiang, Linzhi
    CLOUD COMPUTING AND SECURITY, PT II, 2017, 10603 : 86 - 99
  • [40] A CP-ABE Scheme with Cloud Proxy Re-Encryption
    Zhao K.-Q.
    Kang P.
    Liu B.
    Guo Z.
    Feng C.-S.
    Qing Y.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (03): : 728 - 735