Cloud computing has been developed rapidly in recent years, and offers novel concepts
and innovations in computer use. One application of cloud computing is that
people can designate a proxy to help them to execute a number of tasks in certain
situations instead of undertaking all tasks themselves. With this application,
people can benefit from the proxy; however, some information is revealed to the
proxy, such as their activities, and private data. That is, the proxy is aware of the
actions of people through delegation processes, and proxy re-encryption which is
a cryptographic primitive has been proposed to solve this problem. In the proxy
re-encryption system, when a user (e.g., Alice) wants to send a ciphertext that is
encrypted by her secret key and stored in the cloud to another user (e.g., Bob), she
can designate a proxy to transform the ciphertext into a different ciphertext that can
be decrypted by Bob¡¦s private key. Based on attribute-based encryption and proxy
re-encryption, we propose attribute-based proxy re-encryption with bilinear pairing.
Furthermore, in the proposed scheme, third paries cannot decrypt the ciphertext if
they do no have matching attributes, regardless of being helped by proxy. Finally,
we offer security proofs to demonstrate that the proposed scheme satisfies the essential
requirements of attribute-based encryption schemes and proxy re-encryption
schemes.
Identifer | oai:union.ndltd.org:NSYSU/oai:NSYSU:etd-0830112-133652 |
Date | 30 August 2012 |
Creators | Chen, Chun-Hung |
Contributors | Shi-Ming Huang, Chi-Yao Weng, D.J. Guan, Chun-I Fan, Wei-Zhe Sun |
Publisher | NSYSU |
Source Sets | NSYSU Electronic Thesis and Dissertation Archive |
Language | English |
Detected Language | English |
Type | text |
Format | application/pdf |
Source | http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0830112-133652 |
Rights | user_define, Copyright information available at source archive |
Page generated in 0.0016 seconds