Proxy Re-Encryption: Analysis of Constructions and its Application to Secure Access Delegation

TitleProxy Re-Encryption: Analysis of Constructions and its Application to Secure Access Delegation
Publication TypeJournal Article
Year of Publication2017
AuthorsD. Nuñez, I. Agudo, and J. Lopez
JournalJournal of Network and Computer Applications
Volume87
Pagination193-209
Date Published06/2017
PublisherElsevier
ISSN Number1084-8045
Abstract

This paper analyzes the secure access delegation problem, which occurs naturally in the cloud, and postulate that Proxy Re-Encryption is a feasible cryptographic solution, both from the functional and efficiency perspectives. Proxy re-encryption is a special type of public-key encryption that permits a proxy to transform ciphertexts from one public key to another, without the proxy being able to learn any information about the original message. Thus, it serves as a means for delegating decryption rights, opening up many possible applications that require of delegated access to encrypted data. In particular, sharing information in the cloud is a prime example. In this paper, we review the main proxy re-encryption schemes so far, and provide a detailed analysis of their characteristics. Additionally, we also study the efficiency of selected schemes, both theoretically and empirically, based on our own implementation. Finally, we discuss some applications of proxy re-encryption, with a focus on secure access delegation in the cloud. 

DOI10.1016/j.jnca.2017.03.005
Citation Keynunez2017proxy
Paper File: 
https://www.nics.uma.es/sites/default/files/papers/nunez2017proxy.pdf

Supported by