A Timed-Release Proxy Re-Encryption Scheme

被引:16
作者
Emura, Keita [1 ]
Miyaji, Atsuko [2 ]
Omote, Kazumasa [2 ]
机构
[1] Japan Adv Inst Sci & Technol, Ctr Highly Dependable Embedded Syst Technol, Nomi 9231292, Japan
[2] JAIST, Sch Informat Sci, Nomi, Ishikawa 9231292, Japan
关键词
timed-release encryption; proxy re-encryption;
D O I
10.1587/transfun.E94.A.1682
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Timed-Release Encryption (TRE) is a kind of time-dependent encryption, where the time of decryption can be controlled. More precisely, TRE prevents even a legitimate recipient decrypting a ciphertext before a semi-trusted Time Server (TS) sends trapdoor S-T assigned with a release time T of the encryptor's choice. Cathalo et al. (ICICS2005) and Chalkias et al. (ESORICS2007) have already considered encrypting a message intended for multiple recipients with the same release time. One drawback of these schemes is the ciphertext size and computational complexity, which depend on the number of recipients N. Ideally, it is desirable that any factor (ciphertext size, computational complexity of encryption/decryption, and public/secret key size) does not depend on N. In this paper, to achieve TRE with such fully constant costs from the encryptor's/decryptor's point of view, by borrowing the technique of Proxy Re-Encryption (PRE), we propose a cryptosystem in which even if the proxy transformation is applied to a TRE ciphertext, the release time is still effective. By sending a TRE ciphertext to the proxy, an encryptor can foist N-dependent computation costs on the proxy. We call this cryptosystem Timed-Release PRE (TR-PRE). This function can be applied to efficient multicast communication with a release time indication.
引用
收藏
页码:1682 / 1695
页数:14
相关论文
共 50 条
  • [21] An Efficient Certificateless Proxy Re-Encryption Scheme Without Pairing
    Selvi, S. Sharmila Deva
    Paul, Arinjita
    Rangan, Chandrasekaran Pandu
    PROVABLE SECURITY, PROVSEC 2017, 2017, 10592 : 413 - 433
  • [22] A BGN-Type Homomorphic Proxy Re-Encryption Scheme
    Liu, Shu-Guang
    Zhang, Wei
    INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND INFORMATION SECURITY (CNIS 2015), 2015, : 226 - 229
  • [23] Identity Based Proxy Re-encryption Scheme under LWE
    Yin, Wei
    Wen, Qiaoyan
    Li, Wenmin
    Zhang, Hua
    Jin, Zheng Ping
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2017, 11 (12): : 6116 - 6132
  • [24] Unforgeability of Re-Encryption Keys against Collusion Attack in Proxy Re-Encryption
    Hayashi, Ryotaro
    Matsushita, Tatsuyuki
    Yoshida, Takuya
    Fujii, Yoshihiro
    Okada, Koji
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, 2011, 7038 : 210 - +
  • [25] Applications of Timed-Release Encryption with Implicit Authentication
    Loe, Angelique
    Medley, Liam
    O'Connell, Christian
    Quaglia, Elizabeth A.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2023, 2023, 14064 : 490 - 515
  • [26] Efficient Unidirectional Proxy Re-Encryption
    Chow, Sherman S. M.
    Weng, Jian
    Yang, Yanjiang
    Deng, Robert H.
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2010, 2010, 6055 : 316 - +
  • [27] Fuzzy conditional proxy re-encryption
    Fang LiMing
    Wang JianDong
    Ge ChunPeng
    Ren YongJun
    SCIENCE CHINA-INFORMATION SCIENCES, 2013, 56 (05) : 1 - 13
  • [28] Proxy Re-encryption Scheme based on New Multivariate Quadratic Assumptions
    Zhu, Shuaishuai
    Yang, Xiaoyuan
    JOURNAL OF COMPUTERS, 2013, 8 (12) : 3238 - 3242
  • [29] Proxy Re-encryption from Lattices
    Kirshanova, Elena
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2014, 2014, 8383 : 77 - 94
  • [30] A Timed-Release E-Voting Scheme Based on Paillier Homomorphic Encryption
    Yuan, Ke
    Sang, Peng
    Ge, Jian
    Zhou, Bingcai
    Jia, Chunfu
    IEEE TRANSACTIONS ON SUSTAINABLE COMPUTING, 2024, 9 (05): : 740 - 753