Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
A secure unidirectional proxy re-encryption using identity and secret key exchange
Milgo E.  ACM-SE 47 (Proceedings of the 47th Annual Southeast Regional Conference, Clemson, South Carolina, Mar 19-21, 2009)1-5.2009.Type:Proceedings
Date Reviewed: Sep 23 2009

In 1998, Blaze, Bleumer, and Strauss [1] proposed the concept of proxy re-cryptography (PRC), including proxy re-encryption (PRE) and proxy re-signature (PRS). A PRE scheme is a cryptosystem that allows a third party (proxy) to transform a ciphertext that was encrypted for one party to be decrypted by another. PRE has a number of applications, such as law enforcement monitoring, content distribution, and email forwarding. For instance, Alice may want to forward her encrypted mail to Bob, temporarily, without revealing her secret key. Ateniese et al. present a good survey of PRE [2], and Shao maintains a helpful online bibliography (http://tdt.sjtu.edu.cn/~jshao/prcbib.htm) on PRC.

In this paper, Milgo proposes a new theoretical unidirectional approach to PRE. Milgo’s approach combines the user identity and secret key, in order to provide protection from unreliable proxies, collusion attacks, and reverse attacks. Another interesting property of this approach is that the proxy must receive approval from the delegator in every re-signing process, which enhances the security of the cryptosystem and ensures practical overheads.

In conclusion, Milgo presents a new theoretical implementation of the PRE cryptosystem, with additional protections. The paper is well written and contributes a new idea to the future development of PRE.

Reviewer:  Hao Wang Review #: CR137318 (1007-0710)
1) Blaze, M.; Bleumer, G.; Strauss, M. Advances in cryptology--EUROCRYPT '98. Edited by Nyberg, K.: LNCS 1403. Springer, 1998, 1-30.
2) Ateniese, G.; Fu, K.; Green, M.; Hohenberger, S. Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Transactions on Information and System Security (TISSEC) 9, 1(2006), 1–30.
Bookmark and Share
 
Data Encryption (E.3 )
 
Would you recommend this review?
yes
no
Other reviews under "Data Encryption": Date
ESA/390 integrated cryptographic facility
Yeh P., Ronald M. S. IBM Systems Journal 30(2): 192-205, 1991. Type: Article
Feb 1 1992
Design and implementation of an RSA cryptosystem using multiple DSP chips
Er M., Wong D., Sethu A., Ngeow K. Microprocessors & Microsystems 15(7): 369-378, 1991. Type: Article
Nov 1 1993
An introduction to cryptography
Diffie W. (ed), Hellman M., John Wiley & Sons, Inc., New York, NY, 1984. Type: Book (9780471262336)
Feb 1 1986
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy