Type-based Proxy Re-encryption and its Construction

Qiang Tang

Research output: Book/ReportReportProfessional

81 Citations (Scopus)
469 Downloads (Pure)

Abstract

Recently, the concept of proxy re-encryption has been shown very useful in a number of applications, especially in enforcing access control policies. In existing proxy re-encryption schemes, the delegatee can decrypt all ciphertexts targeted to the delegator after re-encryption by the proxy. Consequently, in order to implement fine-grained access control policies, the delegator needs to either use multiple key pairs or trust the proxy to behave honestly. In this paper, we fine-grain this concept and propose type-based proxy re-encryption, which enables the delegator to selectively delegate his decryption right to the delegatee while only needs one key pair. As a result, type-based proxy re-encryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. We provide a security model for our concept and provide formal definitions for semantic security and ciphertext privacy which is a valuable attribute in privacy-sensitive contexts. We propose two type-based proxy re-encryption schemes: one is CPA secure with ciphertext privacy while the other is CCA secure without ciphertext privacy.
Original languageUndefined
Place of PublicationEnschede
PublisherDistributed and Embedded Security (DIES)
Number of pages23
Publication statusPublished - Jul 2008

Publication series

NameCTIT Technical Report Series
PublisherUniversity of Twente, Centre for Telematics and Information Technology (CTIT)
No.302/TR-CTIT-08-47
ISSN (Print)1381-3625

Keywords

  • METIS-251058
  • SCS-Cybersecurity
  • EWI-13024
  • IR-64857

Cite this

Tang, Q. (2008). Type-based Proxy Re-encryption and its Construction. (CTIT Technical Report Series; No. 302/TR-CTIT-08-47). Enschede: Distributed and Embedded Security (DIES).
Tang, Qiang. / Type-based Proxy Re-encryption and its Construction. Enschede : Distributed and Embedded Security (DIES), 2008. 23 p. (CTIT Technical Report Series; 302/TR-CTIT-08-47).
@book{34d7731f234a4c8cb0a8a1f652248a1b,
title = "Type-based Proxy Re-encryption and its Construction",
abstract = "Recently, the concept of proxy re-encryption has been shown very useful in a number of applications, especially in enforcing access control policies. In existing proxy re-encryption schemes, the delegatee can decrypt all ciphertexts targeted to the delegator after re-encryption by the proxy. Consequently, in order to implement fine-grained access control policies, the delegator needs to either use multiple key pairs or trust the proxy to behave honestly. In this paper, we fine-grain this concept and propose type-based proxy re-encryption, which enables the delegator to selectively delegate his decryption right to the delegatee while only needs one key pair. As a result, type-based proxy re-encryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. We provide a security model for our concept and provide formal definitions for semantic security and ciphertext privacy which is a valuable attribute in privacy-sensitive contexts. We propose two type-based proxy re-encryption schemes: one is CPA secure with ciphertext privacy while the other is CCA secure without ciphertext privacy.",
keywords = "METIS-251058, SCS-Cybersecurity, EWI-13024, IR-64857",
author = "Qiang Tang",
year = "2008",
month = "7",
language = "Undefined",
series = "CTIT Technical Report Series",
publisher = "Distributed and Embedded Security (DIES)",
number = "302/TR-CTIT-08-47",

}

Tang, Q 2008, Type-based Proxy Re-encryption and its Construction. CTIT Technical Report Series, no. 302/TR-CTIT-08-47, Distributed and Embedded Security (DIES), Enschede.

Type-based Proxy Re-encryption and its Construction. / Tang, Qiang.

Enschede : Distributed and Embedded Security (DIES), 2008. 23 p. (CTIT Technical Report Series; No. 302/TR-CTIT-08-47).

Research output: Book/ReportReportProfessional

TY - BOOK

T1 - Type-based Proxy Re-encryption and its Construction

AU - Tang, Qiang

PY - 2008/7

Y1 - 2008/7

N2 - Recently, the concept of proxy re-encryption has been shown very useful in a number of applications, especially in enforcing access control policies. In existing proxy re-encryption schemes, the delegatee can decrypt all ciphertexts targeted to the delegator after re-encryption by the proxy. Consequently, in order to implement fine-grained access control policies, the delegator needs to either use multiple key pairs or trust the proxy to behave honestly. In this paper, we fine-grain this concept and propose type-based proxy re-encryption, which enables the delegator to selectively delegate his decryption right to the delegatee while only needs one key pair. As a result, type-based proxy re-encryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. We provide a security model for our concept and provide formal definitions for semantic security and ciphertext privacy which is a valuable attribute in privacy-sensitive contexts. We propose two type-based proxy re-encryption schemes: one is CPA secure with ciphertext privacy while the other is CCA secure without ciphertext privacy.

AB - Recently, the concept of proxy re-encryption has been shown very useful in a number of applications, especially in enforcing access control policies. In existing proxy re-encryption schemes, the delegatee can decrypt all ciphertexts targeted to the delegator after re-encryption by the proxy. Consequently, in order to implement fine-grained access control policies, the delegator needs to either use multiple key pairs or trust the proxy to behave honestly. In this paper, we fine-grain this concept and propose type-based proxy re-encryption, which enables the delegator to selectively delegate his decryption right to the delegatee while only needs one key pair. As a result, type-based proxy re-encryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. We provide a security model for our concept and provide formal definitions for semantic security and ciphertext privacy which is a valuable attribute in privacy-sensitive contexts. We propose two type-based proxy re-encryption schemes: one is CPA secure with ciphertext privacy while the other is CCA secure without ciphertext privacy.

KW - METIS-251058

KW - SCS-Cybersecurity

KW - EWI-13024

KW - IR-64857

M3 - Report

T3 - CTIT Technical Report Series

BT - Type-based Proxy Re-encryption and its Construction

PB - Distributed and Embedded Security (DIES)

CY - Enschede

ER -

Tang Q. Type-based Proxy Re-encryption and its Construction. Enschede: Distributed and Embedded Security (DIES), 2008. 23 p. (CTIT Technical Report Series; 302/TR-CTIT-08-47).