A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare

Luan Ibraimi, Qiang Tang, Pieter Hartel, Willem Jonker

Research output: Book/ReportReportProfessional

38 Citations (Scopus)
121 Downloads (Pure)

Abstract

Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). In a proxy re-encryption scheme, the delegator assigns a key to a proxy to re-encrypt all messages encrypted with his public key such that the re-encrypted ciphertexts can be decrypted with the delegatee's private key. We propose a type-and-identity-based proxy re-encryption scheme based on the Boneh-Franklin Identity Based Encryption (IBE) scheme. In our scheme, the delegator can categorize messages into different types and delegate the decryption right of each type to the delegatee through a proxy. Our scheme enables the delegator to provide the proxy fine-grained re-encryption capability. As an application, we propose a fine-grained Personal Health Record (PHR) disclosure scheme for healthcare service by applying the proposed scheme.
Original languageEnglish
Place of PublicationEnschede
PublisherCentre for Telematics and Information Technology (CTIT)
Number of pages14
Publication statusPublished - 14 Apr 2008

Publication series

NameCTIT Technical Report Series
PublisherCentre for Telematics and Information Technology, University of Twente
No.TR-CTIT-08-31
ISSN (Print)1381-3625

Keywords

  • SCS-Cybersecurity
  • Proxy re-encryption
  • Identity-based encryption
  • Personal health records

Fingerprint

Dive into the research topics of 'A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare'. Together they form a unique fingerprint.
  • A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare

    Ibraimi, L., Tang, Q., Hartel, P. & Jonker, W., 14 Apr 2008, Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings. Jonker, W. & Petković, M. (eds.). Berlin, Heidelberg: Springer, p. 185-198 14 p. (Lecture Notes in Computer Science; vol. 5159).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

    Open Access
    File
    210 Downloads (Pure)

Cite this