Table of Contents Author Guidelines Submit a Manuscript
Journal of Applied Mathematics
Volume 2014, Article ID 329198, 7 pages
http://dx.doi.org/10.1155/2014/329198
Research Article

Time-and-ID-Based Proxy Reencryption Scheme

1Department of IT Convergence and Engineering, Kyungil University, Daegu 712-701, Republic of Korea
2School of Computer Science and Engineering, Kyungpook National University, Daegu 702-701, Republic of Korea
3Department of Multimedia, Sungkyul University, Anyang-si 430-742, Republic of Korea

Received 28 December 2013; Accepted 4 February 2014; Published 22 May 2014

Academic Editor: Jongsung Kim

Copyright © 2014 Kambombo Mtonga et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. G. Ateniese, K. Fu, M. Green, and S. Hohenberger, “Improved proxy re-encryption schemes with applications to secure distributed storage,” ACM Transactions on Information and System Security, vol. 9, no. 1, pp. 1–30, 2006. View at Google Scholar · View at Scopus
  2. K. H. Choi, K. S. Jang, and H. J. Shin, “Smart home environment for the protection of multimedia digital contents,” The Journal of IWIT, vol. 11, no. 2, pp. 189–196, 2011. View at Google Scholar
  3. C. Chu and W. Tzeng, “Identity-based proxy re-encryption without random oracles,” in Information Security, vol. 4779 of Lecture Notes in Computer Science, pp. 189–202, 2007. View at Google Scholar
  4. E. B. Kim, K. I. Kim, T. H. Kim, and S. H. Cho, “A study of partial preview control method of ePUB-based eBook DRM,” The Journal of IWIT, vol. 12, no. 1, pp. 249–256, 2012. View at Google Scholar
  5. G. Ateniese and S. Hohenberger, “Proxy re-signatures: new definitions, algorithms, and applications,” in Proceedings of the 12th ACM Conference on Computer and Communications Security (CCS '05), pp. 310–319, November 2005. View at Publisher · View at Google Scholar · View at Scopus
  6. B. Libert and D. Vergnaud, “Multi-use unidirectional proxy re-signatures,” in Proceedings of the 15th ACM conference on Computer and Communications Security (CCS '08), pp. 511–520, October 2008. View at Publisher · View at Google Scholar · View at Scopus
  7. M. Blaze, G. Bleumer, and M. Strauss, “Divertible protocols and atomic proxy cryptography,” in Advances in cryptology—EUROCRYPT, vol. 1403 of Lecture Notes in Computer Science, pp. 127–144, 1998. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  8. T. ElGamal, “A public key cryptosystem and a signature scheme based on discrete logarithms,” in Advances in Cryptology, vol. 196 of Lecture Notes in Computer Science, pp. 10–18, 1985. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  9. J. Shao, Z. Cao, and P. Liu, “SCCR: a generic approach to simultaneously achieve CCA security and collusion-resistance in proxy re-encryption,” Security and Communication Networks, vol. 4, no. 2, pp. 122–135, 2011. View at Publisher · View at Google Scholar · View at Scopus
  10. J. Weng, R. H. Deng, X. Ding, C.-K. Chu, and J. Lai, “Conditional proxy re-encryption secure against chosen-ciphertext attack,” in Proceedings of the 4th International Symposium on ACM Symposium on Information, Computer and Communications Security (ASIACCS '09), pp. 322–332, March 2009. View at Publisher · View at Google Scholar · View at Scopus
  11. B. Libert and D. Vergnaud, “Unidirectional chosen-ciphertext secure proxy re-encryption,” in Public Key Cryptography—PKC, vol. 4939 of Lecture Notes in Computer Science, pp. 360–379, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  12. L. Wang, L. Wang, M. Mambo, and E. Okamoto, “New identity-based proxy re-encryption schemes to prevent collusion attacks,” in Pairing-Based Cryptography-Pairing, vol. 6487 of Lecture Notes in Computer Science, pp. 327–346, 2010. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  13. Z.-M. Wan, J. Weng, X.-J. Lai, S.-L. Liu, and J.-G. Li, “On the relation between identity-based proxy re-encryption and mediated identity-based encryption,” Journal of Information Science and Engineering, vol. 27, no. 1, pp. 243–259, 2011. View at Google Scholar · View at MathSciNet
  14. A. Shamir, “Identity-based cryptosystems and signature schemes,” in Advances in Cryptology—Crypto, vol. 196 of Lecture Notes in Computer Science, pp. 47–53, 1985. View at Publisher · View at Google Scholar · View at MathSciNet
  15. D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” in Advances in Cryptology—CRYPTO, vol. 2139 of Lecture Notes in Computer Science, pp. 213–229, 2001. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  16. M. Green and G. Ateniese, “Identity-based proxy re-encryption,” in Proceedings of the 5th international conference on Applied Cryptography and Network Security (ACNS '07), J. Katz and M. Yung, Eds., vol. 4521, pp. 288–306, 2007. View at Publisher · View at Google Scholar
  17. C. Chu and W. Tzeng, “Identity-based proxy re-encryption without random oracles,” in Information Security, vol. 4779, pp. 189–202, 2007. View at Publisher · View at Google Scholar
  18. C. Chu, J. Weng, S. S. M. Chow, J. Zhou, and R. H. Deng, “Conditional proxy broadcast re-encryption,” in Information Security and Privacy, vol. 5594 of Lecture Notes in Computer Science, pp. 327–342, 2009. View at Google Scholar
  19. T. Matsuo, “Proxy re-encryption systems for identity-based encryption,” in Pairing-Based Cryptography—Pairing 2007, vol. 4575 of Lecture Notes in Computer Science, pp. 246–267, 2007. View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  20. D. Boneh and X. Boyen, “Efficient selective-ID secure identity-based encryption without random oracles,” in Advances in Cryptology—EUROCRYPT, vol. 3027 of Lecture Notes in Computer Science, pp. 223–238, 2004. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  21. L. Martin, P1363.3(TM)/D1, Draft Standard For Identity-Based Public Cryptography Using Pairings, 2008.
  22. Q. Tang, “Type-based proxy re-encryption and its construction,” in Progress in Cryptology—INDOCRYPT, vol. 5365 of Lecture Notes in Computer Science, pp. 130–144, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH · View at MathSciNet
  23. J. Weng, Y. Yang, Q. Tang, R. Deng, and F. Bao, “Efficient conditional proxy re-encryption with chosen ciphertext security,” in Information Security, P. Samarati, M. Yung, F. Martinelli, and C. A. Ardagna, Eds., vol. 5735 of Lecture Notes in Computer Science, pp. 151–166, 2009. View at Publisher · View at Google Scholar
  24. J. Weng, R. H. Deng, X. Ding, C.-K. Chu, and J. Lai, “Conditional proxy re-encryption secure against chosen-ciphertext attack,” in Proceedings of the 4th International Symposium on Information, Computer, and Communications Security (ASIACCS '09), pp. 322–332, March 2009. View at Publisher · View at Google Scholar · View at Scopus
  25. L. Ibraimi, Q. Tang, P. Hartel, and W. Jonker, “A type-and-identity-based proxy re-encryption scheme and its application in healthcare,” Secure Data Management, vol. 5159, pp. 185–198, 2008. View at Publisher · View at Google Scholar · View at Scopus
  26. X. A. Wang, X. Yang, and Y. Han, “New identity based encryption and its proxy re-encryption,” Biomedical Engineering and Computer Science, vol. 1, no. 4, pp. 23–25, 2010. View at Google Scholar
  27. S. Luo, Q. Shen, and Z. Chen, “Fully secure unidirectional identity-based proxy re-encryption,” in Proceedings of the 14th International Conference on Information Security and Cryptology, 2011.
  28. A. Paul, J. C. Jiang, J. F. Wang, and J. F. Yang, “Parallel reconfigurable computing-based mapping algorithm for motion estimation in advanced video coding,” ACM Transaction on Embedded Computing Systems, vol. 11, no. S2, article 40, 2012. View at Google Scholar
  29. A. Paul, “Dynamic power management for ubiquitous network devices,” Advanced Science Letters, vol. 19, no. 7, pp. 2046–2049, 2013. View at Google Scholar
  30. A. Paul, “Graph based M2M Optimization in an IoT environment,” in Proceedings of the Research in Adaptive and Convergent Systems (ACM RACS '13), pp. 45–46, October 2013.
  31. D. G. Lee, J. Kim, J. Sung, Y. S. Lee, and S. Rho, “Cryptanalysis of block-wise stream ciphers suitable for the protection of multimedia and ubiquitous systems,” Telecommunication Systems, vol. 44, no. 3-4, pp. 297–306, 2010. View at Publisher · View at Google Scholar · View at Scopus
  32. S. Rho and S.-S. Yeo, “Bridging the semantic gap in multimedia emotion/mood recognition for ubiquitous computing environment,” Journal of Supercomputing, vol. 56, no. 1, pp. 274–286, 2013. View at Publisher · View at Google Scholar · View at Scopus