4.7 Article

Proxy Re-Encryption: Analysis of constructions and its application to secure access delegation

Journal

JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
Volume 87, Issue -, Pages 193-209

Publisher

ACADEMIC PRESS LTD- ELSEVIER SCIENCE LTD
DOI: 10.1016/j.jnca.2017.03.005

Keywords

Proxy Re-Encryption; Cloud computing; Access delegation; Cryptography

Funding

  1. Junta de Andalucia [P11-TIC-07223]
  2. Spanish Ministry of Economy and Competitiveness [TIN2013-41739-R]

Ask authors/readers for more resources

This paper analyzes the secure access delegation problem, which occurs naturally in the cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from the functional and efficiency perspectives. Proxy re-encryption is a special type of public-key encryption that permits a proxy to transform ciphertexts from one public key to another, without the proxy being able to learn any information about the original message. Thus, it serves as a means for delegating decryption rights, opening up many possible applications that require of delegated access to encrypted data. In particular, sharing information in the cloud is a prime example. In this paper, we review the main proxy re-encryption schemes so far, and provide a detailed analysis of their characteristics. Additionally, we also study the efficiency of selected schemes, both theoretically and empirically, based on our own implementation. Finally, we discuss some applications of proxy re encryption, with a focus on secure access delegation in the cloud.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available