A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare

Luan Ibraimi, Qiang Tang, Pieter Hartel, Willem Jonker

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

211 Downloads (Pure)

Abstract

Proxy re-encryption is a cryptographic primitive developed to delegate the decryption right from one party (the delegator) to another (the delegatee). In a proxy re-encryption scheme, the delegator assigns a key to a proxy to re-encrypt all messages encrypted with his public key such that the re-encrypted ciphertexts can be decrypted with the delegatee’s private key. We propose a type-and-identity-based proxy re-encryption scheme based on the Boneh-Franklin Identity Based Encryption (IBE) scheme. In our scheme, the delegator can categorize messages into different types and delegate the decryption right of each type to the delegatee through a proxy. Our scheme enables the delegator to provide the proxy fine-grained re-encryption capability. As an application, we propose a fine-grained Personal Health Record (PHR) disclosure scheme for healthcare service by applying the proposed scheme.
Original languageEnglish
Title of host publicationSecure Data Management
Subtitle of host publication5th VLDB Workshop, SDM 2008, Auckland, New Zealand, August 24, 2008. Proceedings
EditorsWillem Jonker, Milan Petković
Place of PublicationBerlin, Heidelberg
PublisherSpringer
Pages185-198
Number of pages14
ISBN (Electronic)978-3-540-85259-9
ISBN (Print)978-3-540-85258-2
DOIs
Publication statusPublished - 14 Apr 2008
Event5th VLDB Workshop on Secure Data Management, SDM 2008 - Auckland, New Zealand
Duration: 24 Aug 200824 Aug 2008
Conference number: 5

Publication series

NameLecture Notes in Computer Science
PublisherSpringer
Volume5159
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Workshop

Workshop5th VLDB Workshop on Secure Data Management, SDM 2008
Abbreviated titleSDM
Country/TerritoryNew Zealand
CityAuckland
Period24/08/0824/08/08

Keywords

  • SCS-Cybersecurity
  • Proxy re-encryption
  • Identity-based encryption
  • Personal health records

Fingerprint

Dive into the research topics of 'A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare'. Together they form a unique fingerprint.

Cite this