UCSY's Research Repository

Non-Transferable Proxy Re-Encryption for Group Membership/ Non- Group Membership

Show simple item record

dc.contributor.author San, Lwin
dc.contributor.author Cho, Ei Mon
dc.contributor.author Koshiba, Takeshi
dc.date.accessioned 2019-07-12T03:25:50Z
dc.date.available 2019-07-12T03:25:50Z
dc.date.issued 2017-02-16
dc.identifier.uri http://onlineresource.ucsy.edu.mm/handle/123456789/792
dc.description.abstract In proxy re-encryption (PRE) scheme the message is sent by a delegator to a delegatee with a help of the trusted third party proxy without knowing the existing plaintext. PRE schemes are widely used in various applications. However, the standard PRE scheme has some proxy problems called private key generator (PKG) despotism problem. This means that PKG can make re-encryption key without getting permission from the delegator. And also, most of the PRE schemes have the key-escrow problem. If someone can attack PKG in PRE scheme, they can decrypt both the original ciphertext and the reencrypted ciphertext which means the key-escrow problem. A solution for these two problems is to use non-transferable PRE scheme. Non-transferable PRE scheme solved the above PKG despotism problem and key-escrow problem. We would like to introduce our PRE scheme with a new approach. In our scheme, there are three sub-processes, which are based on non-transferable PRE scheme and group signature. Our scheme will provide the security for delegator i, delegatee j (who is in the same group with delegator i), and delegatee k (who is in a different group from delegator i). en_US
dc.language.iso en en_US
dc.publisher Fifteenth International Conference on Computer Applications(ICCA 2017) en_US
dc.title Non-Transferable Proxy Re-Encryption for Group Membership/ Non- Group Membership en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search Repository



Browse

My Account

Statistics