|Title||Proxy Re-Encryption: Analysis of Constructions and its Application to Secure Access Delegation|
|Publication Type||Journal Article|
|Year of Publication||2017|
|Authors||D. Nuñez, I. Agudo, and J. Lopez|
|Journal||Journal of Network and Computer Applications|
This paper analyzes the secure access delegation problem, which occurs naturally in the cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from the functional and efficiency perspectives. Proxy re-encryption is a special type of public-key encryption that permits a proxy to transform ciphertexts from one public key to another, without the proxy being able to learn any information about the original message. Thus, it serves as a means for delegating decryption rights, opening up many possible applications that require of delegated access to encrypted data. In particular, sharing information in the cloud is a prime example. In this paper, we review the main proxy re-encryption schemes so far, and provide a detailed analysis of their characteristics. Additionally, we also study the efficiency of selected schemes, both theoretically and empirically, based on our own implementation. Finally, we discuss some applications of proxy re-encryption, with a focus on secure access delegation in the cloud.
Proxy Re-Encryption: Analysis of Constructions and its Application to Secure Access Delegation