Skip to main content
Erschienen in: Wireless Personal Communications 3/2015

01.06.2015

Secure Content Distribution Using Multi-hop Proxy Re-encryption

verfasst von: Han-Yu Lin

Erschienen in: Wireless Personal Communications | Ausgabe 3/2015

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A proxy re-encryption (PRE) scheme allows a semi-trusted proxy to convert a ciphertext intended for some recipient, say Alice, into another ciphertext which can only be decrypted by the other designated one, say Bob. It is required that the semi-trusted proxy cannot learn any information about the encrypted message. When a PRE scheme enables the semi-trusted proxy to convert a ciphertext intended for Alice into the one intended for Bob and then again convert this ciphertext into another one intended for Candy and so on, it is called multi-hop PRE scheme. In this paper, the author will propose a new multi-hop PRE scheme for secure content distribution. The security assumption is based on the bilinear inverse Diffie–Hellman problem. Compared with related PRE schemes, ours can earn more computational efficiency.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Ateniese, G., Fu, K., Green, M., & Hohenberger, S. (2005). Improved proxy re-encryption schemes with applications to secure distributed storage. In: Proceedings of the 10th Network and Distributed System Security Symposium (NDSS’05) (pp. 29–43). California, U.S.A. Ateniese, G., Fu, K., Green, M., & Hohenberger, S. (2005). Improved proxy re-encryption schemes with applications to secure distributed storage. In: Proceedings of the 10th Network and Distributed System Security Symposium (NDSS’05) (pp. 29–43). California, U.S.A.
2.
Zurück zum Zitat Ateniese, G., Fu, K., Green, M., & Hohenberger, S. (2006). Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security (TISSEC), 9(1), 1–30.CrossRefMATH Ateniese, G., Fu, K., Green, M., & Hohenberger, S. (2006). Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security (TISSEC), 9(1), 1–30.CrossRefMATH
3.
Zurück zum Zitat Blaze, M., Bleumer, G., & Strauss, M. (1998). Divertible protocols and atomic proxy cryptography. In Advances in Cryptology—EUROCRYPT’98 (pp. 127–144). Springer. Blaze, M., Bleumer, G., & Strauss, M. (1998). Divertible protocols and atomic proxy cryptography. In Advances in Cryptology—EUROCRYPT’98 (pp. 127–144). Springer.
4.
Zurück zum Zitat Boneh, D., & Franklin, M. (2001). Identity based encryption from the Weil pairing. In Advances in Cryptology—CRYPTO 2001 (pp. 213–229). Springer. Boneh, D., & Franklin, M. (2001). Identity based encryption from the Weil pairing. In Advances in Cryptology—CRYPTO 2001 (pp. 213–229). Springer.
5.
Zurück zum Zitat Canetti, R., & Hohenberger, S. (2007). Chosen-ciphertext secure proxy re-encryption. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007) (pp. 185–194). Alexandria, U.S.A.: ACM Press. Canetti, R., & Hohenberger, S. (2007). Chosen-ciphertext secure proxy re-encryption. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS 2007) (pp. 185–194). Alexandria, U.S.A.: ACM Press.
6.
Zurück zum Zitat Chiu, Y. P., Lei, C. L., & Huang, C. Y. (2005). Secure multicast using proxy encryption. In Proceedings of the 7th International Conference on Information and Communications Security (ICICS) (pp. 280–290). Beijing, China. Chiu, Y. P., Lei, C. L., & Huang, C. Y. (2005). Secure multicast using proxy encryption. In Proceedings of the 7th International Conference on Information and Communications Security (ICICS) (pp. 280–290). Beijing, China.
7.
Zurück zum Zitat Chu, C. K., & Tzeng, W. G. (2007). Identity-based proxy re-encryption without random oracles. In Proceedings of the 10th Information Security Conference (ISC’07) (pp. 189–202). Springer. Chu, C. K., & Tzeng, W. G. (2007). Identity-based proxy re-encryption without random oracles. In Proceedings of the 10th Information Security Conference (ISC’07) (pp. 189–202). Springer.
8.
Zurück zum Zitat Deng, R. H., Weng, J., Liu, S., & Chen, K. (2008). Chosen-ciphertext secure proxy re-encryption without pairings. In Proceedings of the 7th International Conference on Cryptology and Network Security (CANS 2008) (pp. 1–17). China. Deng, R. H., Weng, J., Liu, S., & Chen, K. (2008). Chosen-ciphertext secure proxy re-encryption without pairings. In Proceedings of the 7th International Conference on Cryptology and Network Security (CANS 2008) (pp. 1–17). China.
9.
Zurück zum Zitat Fang, L., Susilo, W., Ge, C., & Wang, J. (2012). Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theoretical Computer Science, 462(30), 39–58.CrossRefMATHMathSciNet Fang, L., Susilo, W., Ge, C., & Wang, J. (2012). Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theoretical Computer Science, 462(30), 39–58.CrossRefMATHMathSciNet
10.
Zurück zum Zitat Green, M., & Ateniese, G. (2007). Identity-based proxy re-encryption. In Proceedings of Applied Cryptography and Network Security’07 (ACNS 2007) (pp. 288–306). Springer. Green, M., & Ateniese, G. (2007). Identity-based proxy re-encryption. In Proceedings of Applied Cryptography and Network Security’07 (ACNS 2007) (pp. 288–306). Springer.
11.
Zurück zum Zitat Hu, J., Wang, X. A., & Zhang, M. (2010). Toward constant size CCA-secure multi-hop proxy re-encryption. In Proceedings of 2010 2nd International Conference on Signal Processing Systems (ICSPS), Vol. 1 (pp. 603–605). Hu, J., Wang, X. A., & Zhang, M. (2010). Toward constant size CCA-secure multi-hop proxy re-encryption. In Proceedings of 2010 2nd International Conference on Signal Processing Systems (ICSPS), Vol. 1 (pp. 603–605).
12.
Zurück zum Zitat Ivan, A., & Dodis, Y. (2003). Proxy cryptography revisited. In Proceedings of the 10th Network and Distributed System Security Symposium (NDSS’03). California, U.S.A. Ivan, A., & Dodis, Y. (2003). Proxy cryptography revisited. In Proceedings of the 10th Network and Distributed System Security Symposium (NDSS’03). California, U.S.A.
13.
Zurück zum Zitat Khurana, H., & Hahm, H. S. (2006). Certified mailing lists. In Proceedings of the ACM Symposium on Communication, Information, Computer and Communication Security (ASIACCS’06) (pp. 46–58). Taipei, Taiwan. Khurana, H., & Hahm, H. S. (2006). Certified mailing lists. In Proceedings of the ACM Symposium on Communication, Information, Computer and Communication Security (ASIACCS’06) (pp. 46–58). Taipei, Taiwan.
14.
Zurück zum Zitat Khurana, H., Slagell, A., & Bonilla, R. (2005). Sels: A secure e-mail list service. In Proceedings of ACM Symposium on Applied Computing (SAC’05) (pp. 306–313). New Mexico. Khurana, H., Slagell, A., & Bonilla, R. (2005). Sels: A secure e-mail list service. In Proceedings of ACM Symposium on Applied Computing (SAC’05) (pp. 306–313). New Mexico.
15.
Zurück zum Zitat Liang, K., Fang, L., Susilo, W., & Wong, D. S. (2013). A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security. In Proceedings of IEEE 2013 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS) (pp. 552–559). Liang, K., Fang, L., Susilo, W., & Wong, D. S. (2013). A ciphertext-policy attribute-based proxy re-encryption with chosen-ciphertext security. In Proceedings of IEEE 2013 5th International Conference on Intelligent Networking and Collaborative Systems (INCoS) (pp. 552–559).
16.
Zurück zum Zitat Libert, B., & Vergnaud, D. (2008). Unidirectional chosen-ciphertext secure proxy re-encryption. In Proceedings of Public Key Cryptography (PKC 2008) (pp. 360–379). Springer. Libert, B., & Vergnaud, D. (2008). Unidirectional chosen-ciphertext secure proxy re-encryption. In Proceedings of Public Key Cryptography (PKC 2008) (pp. 360–379). Springer.
17.
Zurück zum Zitat Seo, J. W., Yum, D. H., & Lee, P. J. (2013). Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles. Theoretical Computer Science, 491(17), 83–93.CrossRefMATHMathSciNet Seo, J. W., Yum, D. H., & Lee, P. J. (2013). Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles. Theoretical Computer Science, 491(17), 83–93.CrossRefMATHMathSciNet
18.
Zurück zum Zitat Shao, J., & Cao, Z. (2009). CCA-Secure proxy re-encryption without pairings. In Proceedings of Public Key Cryptography (PKC 2009) (pp. 357–376). Springer. Shao, J., & Cao, Z. (2009). CCA-Secure proxy re-encryption without pairings. In Proceedings of Public Key Cryptography (PKC 2009) (pp. 357–376). Springer.
19.
Zurück zum Zitat Taban, G., Cárdenas, A. A., & Gligor, V. D. (2006). Towards a secure and interoperable drm architecture. In Proceedings of the 6th ACM Workshop On Digital Rights Management (pp. 69–78). Alexandria, U.S.A. Taban, G., Cárdenas, A. A., & Gligor, V. D. (2006). Towards a secure and interoperable drm architecture. In Proceedings of the 6th ACM Workshop On Digital Rights Management (pp. 69–78). Alexandria, U.S.A.
20.
Zurück zum Zitat Talmy, A., & Dobzinski, O. (2006). Abuse freedom in access control schemes. In Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006) (pp. 77–86). Vienna, Austria. Talmy, A., & Dobzinski, O. (2006). Abuse freedom in access control schemes. In Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006) (pp. 77–86). Vienna, Austria.
21.
Zurück zum Zitat Wang, X. A., Huang, X., Yang, X., Liu, L., & Wu, X. (2012). Further observation on proxy re-encryption with keyword search. Journal of Systems and Software, 85(3), 643–654.CrossRef Wang, X. A., Huang, X., Yang, X., Liu, L., & Wu, X. (2012). Further observation on proxy re-encryption with keyword search. Journal of Systems and Software, 85(3), 643–654.CrossRef
22.
Zurück zum Zitat Zhang, F., Safavi-Naini, R., & Susilo, W. (2004). An efficient signature scheme from bilinear pairings and its applications. In Proceedings of Public Key Cryptography (PKC 2004) (pp. 277–290). Springer. Zhang, F., Safavi-Naini, R., & Susilo, W. (2004). An efficient signature scheme from bilinear pairings and its applications. In Proceedings of Public Key Cryptography (PKC 2004) (pp. 277–290). Springer.
23.
Zurück zum Zitat Baek, J., Safavi-Naini, R., & Susilo, W. Certificateless public key encryption without pairing. In Proceedings of the 8th International Conference on Information Security (ISC 2005), LNCS, Vol. 3650, (pp. 134–148). Baek, J., Safavi-Naini, R., & Susilo, W. Certificateless public key encryption without pairing. In Proceedings of the 8th International Conference on Information Security (ISC 2005), LNCS, Vol. 3650, (pp. 134–148).
24.
Zurück zum Zitat Scott, M., Costigan, N., & Abdulwahab, W. (2006). Implementing cryptographic pairings on smartcards. In Proceedings of Workshop on Cryptographic Hardware and Embedded Systems 2006 (CHES 2006) (pp. 134–147). Springer. Scott, M., Costigan, N., & Abdulwahab, W. (2006). Implementing cryptographic pairings on smartcards. In Proceedings of Workshop on Cryptographic Hardware and Embedded Systems 2006 (CHES 2006) (pp. 134–147). Springer.
Metadaten
Titel
Secure Content Distribution Using Multi-hop Proxy Re-encryption
verfasst von
Han-Yu Lin
Publikationsdatum
01.06.2015
Verlag
Springer US
Erschienen in
Wireless Personal Communications / Ausgabe 3/2015
Print ISSN: 0929-6212
Elektronische ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-015-2292-7

Weitere Artikel der Ausgabe 3/2015

Wireless Personal Communications 3/2015 Zur Ausgabe

Neuer Inhalt