A Novel Proxy Re-Encryption with Keyword Search

Article Preview

Abstract:

In this paper, a novel proxy re-encryption (PRE) scheme with keyword search is proposed, where only the ciphertext containing the keyword set by the delegator can be transformed by the semi-trusted proxy and then decrypted by delegatee. In the proposed scheme, the semi-trusted proxy can convert the ciphertext encrypted under the delegator’s public key into the ciphertext encrypted under the delegatee’s public key. In addition, only the delegatee’s email gateway with a trapdoor can test whether or not a given cipheretext containing some keyword, but can learn nothing else about the sensitive data of email. We proposed an identity-based proxy re-encryption with keyword search scheme, where the delegator and the delegatee extract keys from a trusted party called the key generator center (KGC), who generates public-private key pair for delegator and delegatee based on their identities. Meanwhile, the identity-based proxy re-encryption with keyword search scheme satisfies the properties of PRE including unidirectionality, multi-use and transparency. Additionally, the proposed scheme is efficient in terms of both computation and communication, and can realize security privacy preserving in cloud computing environments.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

897-901

Citation:

Online since:

September 2014

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Jun Shao, Zhenfu Cao and Xiaohui Liang. Proxy re-encryption with keyword search. Information Sciences 180 (2010) 2576–2587.

DOI: 10.1016/j.ins.2010.03.026

Google Scholar

[2] Liming Fang, Willy Susilo, Chunpeng Ge and Jiandong Wang. Chosen-ciphertext secure anonymous conditional proxy re-encryption with keyword search. Theoretical Computer Science 462 (2012) 39–58.

DOI: 10.1016/j.tcs.2012.08.017

Google Scholar

[3] Jinguang Han, Willy Susilo and Yi Mu. Identity-based data storage in cloud computing. Future Generation Computer Systems 29 (2013) 673–681.

DOI: 10.1016/j.future.2012.07.010

Google Scholar

[4] Keita Emura, Atsuko Miyaji, and Kazumasa Omote. A timed-release proxy re-encryption scheme. IEICE Transactions, 94-A(8): 1682-1695, (2011).

DOI: 10.1587/transfun.e94.a.1682

Google Scholar

[5] S. Chow, J. Weng, Y. Yang and R. Deng, Efficient unidirectional proxy re-encryption, in: Proc. of AFRICACRYPT 2010, in: LNCS, vol. 6055, Springer, Heidelberg, 2010, p.316–332.

DOI: 10.1007/978-3-642-12678-9_19

Google Scholar

[6] Jae Woo Seo, Dae Hyun Yum and Pil Joong Lee. Proxy-invisible CCA-secure type-based proxy re-encryption without random oracles. Theoretical Computer Science 491 (2013) 83–93.

DOI: 10.1016/j.tcs.2012.11.026

Google Scholar

[7] Xuan Wang, Xinyi Huang and Xiaoyuan Yang. Further observation on proxy re-encryption with keyword search. The Journal of Systems and Software 85 (2012) 643– 654.

DOI: 10.1016/j.jss.2011.09.035

Google Scholar

[8] H. S. Rhee, J. H. Park, W. Susilo and D. H. Lee. Trapdoor security in a searchable public-key encryption scheme with a designated tester. Journal of Systems and Software 83(5), 763-771 (2010).

DOI: 10.1016/j.jss.2009.11.726

Google Scholar

[9] Liming Fang, Willy Susilo and Chunpeng Ge. Hierarchical conditional proxy re-encryption. Computer Standards & Interfaces 34 (2012) 380–389.

DOI: 10.1016/j.csi.2012.01.002

Google Scholar