Title
Non-Transferable Proxy Re-Encryption Scheme
Abstract
A proxy re-encryption (PRE) scheme allows a proxy to re-encrypt a ciphertext for Alice (delegator) to a ciphertext for Bob (delegatee) without seeing the underlying plaintext. However, existing PRE schemes generally suffer from at least one of the followings. Some schemes fail to provide the non-transferable property in which the proxy and the delegatee can collude to further delegate the decryption right to anyone. This is the main open problem left for PRE schemes. Other schemes assume the existence of a fully trusted private key generator (PKG) to generate the re-encryption key to be used by the proxy for re-encrypting a given ciphertext for a target delegatee. But this poses two problems in PRE schemes if the PKG is malicious: the PKG in their schemes may decrypt both original ciphertexts and re-encrypted ciphertexts (referred as the key escrow problem); and the PKG can generate reencryption key for arbitrary delegatees without permission from the delegator (we refer to it as the PKG despotism problem). In this paper, we propose the first non-transferable proxy re-encryption scheme which successfully achieves the nontransferable property. We show that the new scheme solved the PKG despotism problem and key escrow problem as well.
Year
DOI
Venue
2012
10.1109/NTMS.2012.6208714
2012 5th International Conference on New Technologies, Mobility and Security (NTMS)
Keywords
Field
DocType
nontransferable proxy reencryption scheme,PRE scheme,ciphertext,nontransferable property,delegatee,fully trusted private key generator,reencryption key generate,PKG despotism,key escrow problem
Trusted Computing,Delegate,Computer science,Computer security,Encryption,Ciphertext,Key escrow,Public-key cryptography,Plaintext,Distributed computing,Proxy re-encryption
Conference
ISSN
ISBN
Citations 
2157-4952
978-1-4673-0228-9
2
PageRank 
References 
Authors
0.38
10
4
Name
Order
Citations
PageRank
Yi Jun He162.49
Tat Wing Chim2796.70
Lucas C. K. Hui3833110.97
Siu-Ming Yiu44812.43