A Timed-Release Proxy Re-Encryption Scheme

被引:16
作者
Emura, Keita [1 ]
Miyaji, Atsuko [2 ]
Omote, Kazumasa [2 ]
机构
[1] Japan Adv Inst Sci & Technol, Ctr Highly Dependable Embedded Syst Technol, Nomi 9231292, Japan
[2] JAIST, Sch Informat Sci, Nomi, Ishikawa 9231292, Japan
关键词
timed-release encryption; proxy re-encryption;
D O I
10.1587/transfun.E94.A.1682
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Timed-Release Encryption (TRE) is a kind of time-dependent encryption, where the time of decryption can be controlled. More precisely, TRE prevents even a legitimate recipient decrypting a ciphertext before a semi-trusted Time Server (TS) sends trapdoor S-T assigned with a release time T of the encryptor's choice. Cathalo et al. (ICICS2005) and Chalkias et al. (ESORICS2007) have already considered encrypting a message intended for multiple recipients with the same release time. One drawback of these schemes is the ciphertext size and computational complexity, which depend on the number of recipients N. Ideally, it is desirable that any factor (ciphertext size, computational complexity of encryption/decryption, and public/secret key size) does not depend on N. In this paper, to achieve TRE with such fully constant costs from the encryptor's/decryptor's point of view, by borrowing the technique of Proxy Re-Encryption (PRE), we propose a cryptosystem in which even if the proxy transformation is applied to a TRE ciphertext, the release time is still effective. By sending a TRE ciphertext to the proxy, an encryptor can foist N-dependent computation costs on the proxy. We call this cryptosystem Timed-Release PRE (TR-PRE). This function can be applied to efficient multicast communication with a release time indication.
引用
收藏
页码:1682 / 1695
页数:14
相关论文
共 50 条
[31]   A New Dynamic Conditional Proxy Broadcast Re-Encryption Scheme for Cloud [J].
Chen, Zhanwen ;
Chen, Jiageng ;
Meng, Weizhi .
2020 IEEE INTL CONF ON DEPENDABLE, AUTONOMIC AND SECURE COMPUTING, INTL CONF ON PERVASIVE INTELLIGENCE AND COMPUTING, INTL CONF ON CLOUD AND BIG DATA COMPUTING, INTL CONF ON CYBER SCIENCE AND TECHNOLOGY CONGRESS (DASC/PICOM/CBDCOM/CYBERSCITECH), 2020, :569-576
[32]   DR-PRE: dual receiver proxy re-encryption scheme [J].
Patil, Shravani Mahesh ;
Purushothama, B. R. .
INFORMATION SECURITY JOURNAL, 2020, 29 (02) :62-72
[33]   Attribute-based proxy re-encryption scheme with multiple features [J].
Feng C. ;
Luo W. ;
Qin Z. ;
Yuan D. ;
Zou L. .
Tongxin Xuebao/Journal on Communications, 2019, 40 (06) :177-189
[34]   On the Security of a Bidirectional Proxy Re-encryption Scheme from PKC 2010 [J].
Weng, Jian ;
Zhao, Yunlei ;
Hanaoka, Goichiro .
PUBLIC KEY CRYPTOGRAPHY - PKC 2011, 2011, 6571 :284-+
[35]   Robust Threshold Proxy Re-encryption Scheme from Ideal Lattices [J].
Wu L.-Q. ;
Han Y.-L. ;
Yang X.-Y. ;
Zhang M.-Q. ;
Yang K. .
Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2020, 48 (09) :1786-1794
[36]   Hierarchical conditional proxy re-encryption [J].
Fang, Liming ;
Susilo, Willy ;
Ge, Chunpeng ;
Wang, Jiandong .
COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) :380-389
[37]   Attribute-Based Verifiable Conditional Proxy Re-Encryption Scheme [J].
Tang, Yongli ;
Jin, Minglu ;
Meng, Hui ;
Yang, Li ;
Zheng, Chengfu .
ENTROPY, 2023, 25 (05)
[38]   Fuzzy conditional proxy re-encryption [J].
FANG LiMing ;
WANG JianDong ;
GE ChunPeng ;
REN YongJun .
Science China(Information Sciences), 2013, 56 (05) :211-223
[39]   Proxy re-encryption with keyword search [J].
Shao, Jun ;
Cao, Zhenfu ;
Liang, Xiaohui ;
Lin, Huang .
INFORMATION SCIENCES, 2010, 180 (13) :2576-2587
[40]   Conditional Proxy Broadcast Re-Encryption [J].
Chu, Cheng-Kang ;
Weng, Jian ;
Chow, Sherman S. M. ;
Zhou, Jianying ;
Deng, Robert H. .
INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 :327-+