Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation.

J. Network and Computer Applications(2017)

引用 61|浏览13
暂无评分
摘要
This paper analyzes the secure access delegation problem, which occurs naturally in the cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from the functional and efficiency perspectives. Proxy re-encryption is a special type of public-key encryption that permits a proxy to transform ciphertexts from one public key to another, without the proxy being able to learn any information about the original message. Thus, it serves as a means for delegating decryption rights, opening up many possible applications that require of delegated access to encrypted data. In particular, sharing information in the cloud is a prime example. In this paper, we review the main proxy re-encryption schemes so far, and provide a detailed analysis of their characteristics. Additionally, we also study the efficiency of selected schemes, both theoretically and empirically, based on our own implementation. Finally, we discuss some applications of proxy re-encryption, with a focus on secure access delegation in the cloud. HighlightsProxy re-encryption constitutes a suitable solution for secure access delegation.We study the security and properties of the main proxy re-encryption schemes so far.We compare the performance of several schemes, both theoretically and experimentally.We review the state of research on applications of proxy re-encryption.
更多
查看译文
关键词
Proxy Re-Encryption,Cloud computing,Access delegation,Cryptography
AI 理解论文
溯源树
样例
生成溯源树,研究论文发展脉络
Chat Paper
正在生成论文摘要