Improved proxy re-encryption scheme for symmetric key cryptography

Amril Syalim, Takashi Nishide, Kouichi Sakurai

Research output: Chapter in Book/Report/Conference proceedingConference contribution

4 Citations (Scopus)

Abstract

A proxy re-encryption scheme is a scheme that can be executed by a semi-trusted proxy, so that we can convert a ciphertext encrypted with a key to another ciphertext without allowing the proxy to access the plaintext. A method to implement a secure proxy re-encryption is by first converting the plaintext to an intermediate form by using an all or nothing transform (AONT). In this paper, we describe an improved proxy re-encryption scheme for symmetric cipher by advocating the usage of a variant of the AONT function in the proxy re-encryption scheme. We show that the scheme secure under Chosen Plaintext Attack (CPA) for all possible types of attackers.

Original languageEnglish
Title of host publicationProceedings - WBIS 2017
Subtitle of host publication2017 International Workshop on Big Data and Information Security
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages105-111
Number of pages7
ISBN (Electronic)9781538620380
DOIs
Publication statusPublished - Jan 29 2018
Event2017 International Workshop on Big Data and Information Security, WBIS 2017 - Jakarta, Indonesia
Duration: Sep 23 2017Sep 24 2017

Publication series

NameProceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security
Volume2018-January

Other

Other2017 International Workshop on Big Data and Information Security, WBIS 2017
CountryIndonesia
CityJakarta
Period9/23/179/24/17

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications
  • Information Systems and Management
  • Safety, Risk, Reliability and Quality

Fingerprint Dive into the research topics of 'Improved proxy re-encryption scheme for symmetric key cryptography'. Together they form a unique fingerprint.

  • Cite this

    Syalim, A., Nishide, T., & Sakurai, K. (2018). Improved proxy re-encryption scheme for symmetric key cryptography. In Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security (pp. 105-111). (Proceedings - WBIS 2017: 2017 International Workshop on Big Data and Information Security; Vol. 2018-January). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/IWBIS.2017.8275110