A Timed-Release Proxy Re-Encryption Scheme

被引:16
作者
Emura, Keita [1 ]
Miyaji, Atsuko [2 ]
Omote, Kazumasa [2 ]
机构
[1] Japan Adv Inst Sci & Technol, Ctr Highly Dependable Embedded Syst Technol, Nomi 9231292, Japan
[2] JAIST, Sch Informat Sci, Nomi, Ishikawa 9231292, Japan
关键词
timed-release encryption; proxy re-encryption;
D O I
10.1587/transfun.E94.A.1682
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Timed-Release Encryption (TRE) is a kind of time-dependent encryption, where the time of decryption can be controlled. More precisely, TRE prevents even a legitimate recipient decrypting a ciphertext before a semi-trusted Time Server (TS) sends trapdoor S-T assigned with a release time T of the encryptor's choice. Cathalo et al. (ICICS2005) and Chalkias et al. (ESORICS2007) have already considered encrypting a message intended for multiple recipients with the same release time. One drawback of these schemes is the ciphertext size and computational complexity, which depend on the number of recipients N. Ideally, it is desirable that any factor (ciphertext size, computational complexity of encryption/decryption, and public/secret key size) does not depend on N. In this paper, to achieve TRE with such fully constant costs from the encryptor's/decryptor's point of view, by borrowing the technique of Proxy Re-Encryption (PRE), we propose a cryptosystem in which even if the proxy transformation is applied to a TRE ciphertext, the release time is still effective. By sending a TRE ciphertext to the proxy, an encryptor can foist N-dependent computation costs on the proxy. We call this cryptosystem Timed-Release PRE (TR-PRE). This function can be applied to efficient multicast communication with a release time indication.
引用
收藏
页码:1682 / 1695
页数:14
相关论文
共 50 条
[41]   Blockchain Data Controlled Sharing Scheme Based on Proxy Re-Encryption [J].
Guo Q. ;
Tian Y.-L. ;
Wan L. .
Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2023, 51 (02) :477-488
[42]   Attribute-based Proxy Re-encryption Scheme with Keyword Search [J].
Liu Zhenhua ;
Zhou Peilin ;
Duan Shuhong .
JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2018, 40 (03) :683-689
[43]   Fuzzy conditional proxy re-encryption [J].
LiMing Fang ;
JianDong Wang ;
ChunPeng Ge ;
YongJun Ren .
Science China Information Sciences, 2013, 56 :1-13
[44]   Proxy Impersonation Safe Conditional Proxy Re-Encryption [J].
Gandhi, Dheeraj ;
Rangan, Pandu ;
Selvi, Sharmila Deva ;
Vivek, Sree .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON CLOUD SECURITY MANAGEMENT (ICCSM-2013), 2013, :33-44
[45]   TIDE: A Novel Approach to Constructing Timed-Release Encryption [J].
Loe, Angelique Faye ;
Medley, Liam ;
O'Connell, Christian ;
Quaglia, Elizabeth A. .
INFORMATION SECURITY AND PRIVACY, ACISP 2022, 2022, 13494 :244-264
[46]   Hierarchical Identity Role based proxy re-encryption scheme for cloud computing [J].
Nirmala, V ;
Shanmugalakshmi, R. .
PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING & COMMUNICATION SYSTEMS (ICACCS), 2013,
[47]   Anonymous Query Mechanism Construction of Timed-Release Encryption [J].
Yuan K. ;
Wang Z. ;
Du Z. ;
He X. ;
Jia C. ;
He Y. .
Gongcheng Kexue Yu Jishu/Advanced Engineering Sciences, 2022, 54 (03) :64-71
[48]   CCA secure and efficient proxy re-encryption scheme without bilinear pairing [J].
Prasad, Shilpee ;
Purushothama, B. R. .
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2021, 58
[49]   An improved proxy re-encryption scheme using resource optimization and authentication protocol [J].
Burra, Vijaya Babu ;
Pachala, Sunitha .
INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2023,
[50]   Proxy Visible Re-Encryption Scheme with Application to E-Mail Forwarding [J].
Pareek, Gaurav ;
Purushothama, B. R. .
SIN'17: PROCEEDINGS OF THE 10TH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2017, :212-217