Addressing leakage of re-encryption key in proxy re-encryption using trusted computing

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Proxy re-encryption is a cryptographic primitive enabling a proxy holding a re-encryption key to convert a ciphertext originally intended for Alice (delegator) into an encryption of the same message for Bob (delegatee). Proxy re-encryption is a useful tool, having many applications. However, we observe that the issue of re-encryption key leakage, where the delegatee acquires the re-encryption key from the proxy, has been neglected by virtually all of the existing work. Possession of the re-encryption key allows the delegatee to decrypt the delegator's ciphertexts by himself, without necessarily turning to the proxy for conversion, which may contradict the delegator's interest. In this work, we present a method to address this issue using trusted computing technology. Our proposal represents yet another application of trusted computing. © 2011 Springer-Verlag.

Author supplied keywords

Cite

CITATION STYLE

APA

Yang, Y., Gu, L., & Bao, F. (2011). Addressing leakage of re-encryption key in proxy re-encryption using trusted computing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 6802 LNCS, pp. 189–199). https://doi.org/10.1007/978-3-642-25283-9_13

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free