Time-and-ID-Based Proxy Reencryption Scheme

Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was samp...

Full description

Saved in:
Bibliographic Details
Main Authors: Kambombo Mtonga, Anand Paul, Seungmin Rho
Format: Article
Language:English
Published: Wiley 2014-01-01
Series:Journal of Applied Mathematics
Online Access:http://dx.doi.org/10.1155/2014/329198
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832551622024101888
author Kambombo Mtonga
Anand Paul
Seungmin Rho
author_facet Kambombo Mtonga
Anand Paul
Seungmin Rho
author_sort Kambombo Mtonga
collection DOAJ
description Time- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE) and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE). We prove that our scheme is semantically secure in the standard model.
format Article
id doaj-art-a96e096c9599423daee2fe1c9c8a6186
institution Kabale University
issn 1110-757X
1687-0042
language English
publishDate 2014-01-01
publisher Wiley
record_format Article
series Journal of Applied Mathematics
spelling doaj-art-a96e096c9599423daee2fe1c9c8a61862025-02-03T06:01:05ZengWileyJournal of Applied Mathematics1110-757X1687-00422014-01-01201410.1155/2014/329198329198Time-and-ID-Based Proxy Reencryption SchemeKambombo Mtonga0Anand Paul1Seungmin Rho2Department of IT Convergence and Engineering, Kyungil University, Daegu 712-701, Republic of KoreaSchool of Computer Science and Engineering, Kyungpook National University, Daegu 702-701, Republic of KoreaDepartment of Multimedia, Sungkyul University, Anyang-si 430-742, Republic of KoreaTime- and ID-based proxy reencryption scheme is proposed in this paper in which a type-based proxy reencryption enables the delegator to implement fine-grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time-and-identity-based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity-based scheme (BB-IBE) and Matsuo’s proxy reencryption scheme for identity-based encryption (IBE to IBE). We prove that our scheme is semantically secure in the standard model.http://dx.doi.org/10.1155/2014/329198
spellingShingle Kambombo Mtonga
Anand Paul
Seungmin Rho
Time-and-ID-Based Proxy Reencryption Scheme
Journal of Applied Mathematics
title Time-and-ID-Based Proxy Reencryption Scheme
title_full Time-and-ID-Based Proxy Reencryption Scheme
title_fullStr Time-and-ID-Based Proxy Reencryption Scheme
title_full_unstemmed Time-and-ID-Based Proxy Reencryption Scheme
title_short Time-and-ID-Based Proxy Reencryption Scheme
title_sort time and id based proxy reencryption scheme
url http://dx.doi.org/10.1155/2014/329198
work_keys_str_mv AT kambombomtonga timeandidbasedproxyreencryptionscheme
AT anandpaul timeandidbasedproxyreencryptionscheme
AT seungminrho timeandidbasedproxyreencryptionscheme