JAIST Repository >
b. 情報科学研究科・情報科学系 >
b10. 学術雑誌論文等 >
b10-1. 雑誌掲載論文 >

このアイテムの引用には次の識別子を使用してください: http://hdl.handle.net/10119/9510

タイトル: A Timed-Release Proxy Re-Encryption Scheme and its Application to Fairly-Opened Multicast Communication
著者: Emura, Keita
Miyaji, Atsuko
Omote, Kazumasa
キーワード: Timed-Release Encryption
発行日: 2010
出版者: Springer
誌名: Lecture Notes in Computer Science
巻: 6402/2010
開始ページ: 200
終了ページ: 213
DOI: 10.1007/978-3-642-16280-0_14
抄録: Timed-Release Encryption (TRE) (proposed by May in 1993)prevents even a legitimate recipient decrypting a iphertext before a semi-trusted Time Server (TS) sends trapdoor sT assigned with a release time T of the encryptor’s choice. Cathalo et al. (ICICS2005) and Chalkias et al. (ESORICS2007) have already considered encrypting a message intended to multiple recipients with the same release time.These schemes are efficient compared with previous TRE chemes with recipient-to-recipient encryption, since the most costly part (especially pairing computation) has only to be computed once, and this element is used commonly. One drawback of these schemes is the ciphertext size and computational complexity, which depend on the number of recipients N. In this paper, for the first time we propose Timed-Release Proxy Re-Encryption (TR-PRE) scheme. As in PRE, a semi-trusted proxy transforms a ciphertext under a particular public key (this can be regarded as a mailing list) into re-encrypted ciphertexts under each recipient (who can be regarded as mailing list members). Even if the proxy transformation is applied to a TRE ciphertext, the release time is still effective.An encryptor can transfer N-dependent computation parts to the proxy. This function can be applied to multicast communication with a release time indication. For example, in an on-line examination, an examiner sends encrypted e-mails to each examinee, and each examination can befairly opened at the same time. Our TR-PRE scheme is provably secure under both chosen-time period chosen-ciphertext attack (IND-CTCA) and replayable chosen-ciphertext attack (IND-RCCA) without random oracles.
Rights: This is the author-created version of Springer, Keita Emura, Atsuko Miyaji and Kazumasa Omote, Lecture Notes in Computer Science, 6402/2010, 2010, 200-213. The original publication is available at www.springerlink.com, http://dx.doi.org/10.1007/978-3-642-16280-0_14
URI: http://hdl.handle.net/10119/9510
資料タイプ: author
出現コレクション:b10-1. 雑誌掲載論文 (Journal Articles)

このアイテムのファイル:

ファイル 記述 サイズ形式
15715-1.pdf145KbAdobe PDF見る/開く

当システムに保管されているアイテムはすべて著作権により保護されています。

 


お問い合わせ先 : 北陸先端科学技術大学院大学 研究推進課図書館情報係