Volume -I , Issue -X, April 2015
|
IDENTITY-BASED CONDITIONAL PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES FOR SECURING BROKERLESS PUBLISH/SUBSCRIBE SYSTEMS
|
|
Author(s) :
|
Shagoufta Taskeen , Vidyarani H. J.
|
|
Abstract
|
Identity-based encryption (IBE) is an important primitive of identity-based cryptography. As such it is a type of public-key encryption in which the public key of a user is some unique information about the identity of the user.In an identity-based proxy re-encryption (IB-PRE) scheme, a semi-trusted proxy can convert a ciphertext under Alice’s identity into a ciphertext for Bob. The proxy does not know the secret key of Alice or Bob, and also does not know the plaintext during the conversion. However, some scenarios require handle a fine-grained delegation. In this paper, by using the identity-based encryption (IBE) technique of Boneh-Boyen, we propose a new identity-based conditional proxy re-encryption (IBCPRE) scheme, which enables Alice to implement fine-grained delegation of decryption rights, and thus is more useful in many applications. Our scheme has significant advantages in both computational and communicational than Shao et al.’s IBCPRE scheme.
|
|
Keywords
|
peer-to-peer, broker-less, security,identity-based encryption.Proxy re-encryption, Identity-based conditional proxy re-encryption, Bilinear maps. |
|
References
|
- http://en.wikipedia.org/wiki/Web_server.
- J. Bacon, D.M. Eyers, J. Singh, and P.R. Pietzuch, “Access Controlin Publish/Subscribe Systems,” Proc. Second ACM Int’l Conf.Distributed Event-Based Systems (DEBS),2008.
- J. Bethencourt, A. Sahai, and B. Waters, “Ciphertext-PolicyAttribute-Based Encryption,”Proc. IEEE Symp. Security andPrivacy,2007.
- E. Anceaume, M. Gradinariu, A.K. Datta, G. Simon, and A.Virgillito, “A Semantic Overlay for Self- Peer-to-Peer Publish/Subscribe,” Proc. 26th IEEE Int’l Conf. Distributed ComputingSystems (ICDCS),2006.
- D. Boneh and M.K. Franklin, “Identity-Based Encryption from theWeil Pairing,”Proc. Int’l Cryptology Conf. Advances in Cryptology,2001.
- M. Ion, G. Russello, and B. Crispo, “Supporting Publication and Subscription Confidentiality in Pub/Sub Networks,”Proc. SixthInt’l ICST Conf. Security and Privacy in Comm. Networks (Secur-eComm),2010.
- D. Boneh, G.D. Crescenzo, R. Ostrovsky, and G. Persiano, “PublicKey Encryption with Keyword Search,”Proc. Int’l Conf. Theory andApplications of Cryptographic Techniques on Advances in Cryptology(EUROCRYPT),2004.
- S. Choi, G. Ghinita, and E. Bertino, “A Privacy-EnhancingContent-Based Publish/Subscribe System Using Scalar ProductPreserving Transformations,”Proc. 21st Int’l Conf. Database andExpert Systems Applications: Part I,2010.
- Zhu Fande ; Inf. Eng. Coll., Yangzhou Univ., Yangzhou, China ; Chen Hongjian “µCLinux-based WEBSERVER realization on ARM platform” Computing, Communication, Control, and Management, 2009. CCCM 2009. ISECS International Colloquium on (Volume:1 ).
|
|
How to Cite this Paper? [APA Style]
|
Shagoufta Taskeen , Vidyarani H. J. , (2015), IDENTITY-BASED CONDITIONAL PROXY RE-ENCRYPTION WITHOUT RANDOM ORACLES FOR SECURING BROKERLESS PUBLISH/SUBSCRIBE SYSTEMS, Industrial Science Journal, http://industrialscience.org/Article.aspx?aid=68&vid=10, (April, 2015)
|
|
Full Text in PDF
|
|
|
|
|
Archive
|