4.5 Article

Conditional Identity-Based Broadcast Proxy Re-Encryption and Its Application to Cloud Email

Journal

IEEE TRANSACTIONS ON COMPUTERS
Volume 65, Issue 1, Pages 66-79

Publisher

IEEE COMPUTER SOC
DOI: 10.1109/TC.2015.2417544

Keywords

Proxy re-encryption; cloud storage; identity-based encryption; broadcast encryption; secure cloud email

Funding

  1. National Natural Science Foundation of China [61472156]
  2. National Program on Key Basic Research Project (973 Program) [2014CB340600]
  3. Chinese National Key Basic Research Program (973 program) [2012CB315905]
  4. Natural Science Foundation of China [61370190, 61173154, 61472429, 61402029, 61272501, 61202465, 61321064, 61003214]
  5. Beijing Natural Science Foundation [4132056]
  6. Fundamental Research Funds for the Central Universities
  7. Renmin University of China [14XNLF02]
  8. Open Research Fund of Beijing Key Laboratory of Trusted Computing

Ask authors/readers for more resources

Recently, a number of extended Proxy Re-Encryptions (PRE), e.g. Conditional (CPRE), identity-based PRE (IPRE) and broadcast PRE (BPRE), have been proposed for flexible applications. By incorporating CPRE, IPRE and BPRE, this paper proposes a versatile primitive referred to as conditional identity-based broadcast PRE (CIBPRE) and formalizes its semantic security. CIBPRE allows a sender to encrypt a message to multiple receivers by specifying these receivers' identities, and the sender can delegate a re-encryption key to a proxy so that he can convert the initial ciphertext into a new one to a new set of intended receivers. Moreover, the re-encryption key can be associated with a condition such that only the matching ciphertexts can be re-encrypted, which allows the original sender to enforce access control over his remote ciphertexts in a fine-grained manner. We propose an efficient CIBPRE scheme with provable security. In the instantiated scheme, the initial ciphertext, the re-encrypted ciphertext and the re-encryption key are all in constant size, and the parameters to generate a re-encryption key are independent of the original receivers of any initial ciphertext. Finally, we show an application of our CIBPRE to secure cloud email system advantageous over existing secure email systems based on Pretty Good Privacy protocol or identity-based encryption.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.5
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available