• DocumentCode
    2223360
  • Title

    Non-Transferable Proxy Re-Encryption Scheme

  • Author

    He, Yi-Jun ; Chim, Tat Wing ; Hui, Lucas Chi Kwong ; Yiu, Siu-Ming

  • Author_Institution
    Dept. of Comput. Sci., Univ. of Hong Kong, Hong Kong, China
  • fYear
    2012
  • fDate
    7-10 May 2012
  • Firstpage
    1
  • Lastpage
    4
  • Abstract
    A proxy re-encryption (PRE) scheme allows a proxy to re-encrypt a ciphertext for Alice (delegator) to a ciphertext for Bob (delegatee) without seeing the underlying plaintext. However, existing PRE schemes generally suffer from at least one of the followings. Some schemes fail to provide the non-transferable property in which the proxy and the delegatee can collude to further delegate the decryption right to anyone. This is the main open problem left for PRE schemes. Other schemes assume the existence of a fully trusted private key generator (PKG) to generate the re-encryption key to be used by the proxy for re-encrypting a given ciphertext for a target delegatee. But this poses two problems in PRE schemes if the PKG is malicious: the PKG in their schemes may decrypt both original ciphertexts and re-encrypted ciphertexts (referred as the key escrow problem); and the PKG can generate reencryption key for arbitrary delegatees without permission from the delegator (we refer to it as the PKG despotism problem). In this paper, we propose the first non-transferable proxy re-encryption scheme which successfully achieves the nontransferable property. We show that the new scheme solved the PKG despotism problem and key escrow problem as well.
  • Keywords
    private key cryptography; trusted computing; PKG despotism; PRE scheme; ciphertext; delegatee; fully trusted private key generator; key escrow problem; nontransferable property; nontransferable proxy reencryption scheme; reencryption key generate; Computer science; Encryption; Generators; Protocols; Public key; Servers;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on
  • Conference_Location
    Istanbul
  • ISSN
    2157-4952
  • Print_ISBN
    978-1-4673-0228-9
  • Electronic_ISBN
    2157-4952
  • Type

    conf

  • DOI
    10.1109/NTMS.2012.6208714
  • Filename
    6208714