2024年3月16日发(作者:营向真)
ImprovedProxyRe-encryptionSchemeswith
ApplicationstoSecureDistributedStorage
GIUSEPPEATENIESE
TheJohnsHopkinsUniversity
KEVINFU
UniversityofMassachusetts,Amherst
MATTHEWGREEN
TheJohnsHopkinsUniversity
and
SUSANHOHENBERGER
MassachusettsInstituteofTechnology
In1998,Blaze,Bleumer,andStrauss(BBS)proposedanapplicationcalledatomicproxy
re-encryption,inwhichasemitrustedproxyconvertsaciphertextforAliceintoaciphertextfor
ictthatfastandsecurere-encryptionwillbe-
comeincreasinglypopularasamethodformanagingencryptedfighefficiently
computable,thewide-spreadadoptionofBBSre-encryptionhasbeenhinderedbyconsiderable
ingrecentworkofDodisandIvan,wepresentnewre-encryptionschemes
thatrealizeastrongernotionofsecurityanddemonstratetheusefulnessofproxyre-encryption
asamethodofaddingaccesscontroltoasecurefimancemeasurementsofour
experimentalfilesystemdemonstratethatproxyre-encryptioncanworkeffectivelyinpractice.
CategoriesandSubjectDescriptors:H.3.4[InformationStorageandRetrieval]:Systemsand
Software—Distributedsystems;E.3[DataEncryption]:PublicKeyCryptosystems
GeneralTerms:Security,Algorithms
AdditionalKeyWordsandPhrases:Proxyre-encryption,doubledecryption,keytranslation,
bilinearmaps
UCTION
Proxyre-encryptionallowsaproxytotransformaciphertextcomputedunder
Alice’spublickeyintoonethatcanbeopenedbyBob’re
Authors’addresses:se,;DepartmentofComputerScience;TheJohnsHopkins
University;sSt.;Baltimore,MD21218;;DepartmentofComputerScience;
140GovernorsDrive;UniversityofMassachusetts;Amherst,MA01003-9264;erger;
ComputerScienceandArtificialIntelligenceLaboratory;MassachusettsInstituteofTechnology;
32VassarSt.;Cambridge,MA02139.
Permissiontomakedigitalorhardcopiesofpartorallofthisworkforpersonalorclassroomuseis
grantedwithoutfeeprovidedthatcopiesarenotmadeordistributedforprofitordirectcommercial
advantageandthatcopiesshowthisnoticeonthefirstpageorinitialscreenofadisplayalong
ghtsforcomponentsofthisworkownedbyothersthanACMmustbe
otherwise,torepublish,topostonservers,
toredistributetolists,ortouseanycomponentofthisworkinotherworksrequirespriorspecific
permissionand/sionsmayberequestedfromPublicationsDept.,ACM,Inc.,1515
Broadway,NewYork,NY10036USA,fax:+1(212)869-0481,orpermissions@.
2024年3月16日发(作者:营向真)
ImprovedProxyRe-encryptionSchemeswith
ApplicationstoSecureDistributedStorage
GIUSEPPEATENIESE
TheJohnsHopkinsUniversity
KEVINFU
UniversityofMassachusetts,Amherst
MATTHEWGREEN
TheJohnsHopkinsUniversity
and
SUSANHOHENBERGER
MassachusettsInstituteofTechnology
In1998,Blaze,Bleumer,andStrauss(BBS)proposedanapplicationcalledatomicproxy
re-encryption,inwhichasemitrustedproxyconvertsaciphertextforAliceintoaciphertextfor
ictthatfastandsecurere-encryptionwillbe-
comeincreasinglypopularasamethodformanagingencryptedfighefficiently
computable,thewide-spreadadoptionofBBSre-encryptionhasbeenhinderedbyconsiderable
ingrecentworkofDodisandIvan,wepresentnewre-encryptionschemes
thatrealizeastrongernotionofsecurityanddemonstratetheusefulnessofproxyre-encryption
asamethodofaddingaccesscontroltoasecurefimancemeasurementsofour
experimentalfilesystemdemonstratethatproxyre-encryptioncanworkeffectivelyinpractice.
CategoriesandSubjectDescriptors:H.3.4[InformationStorageandRetrieval]:Systemsand
Software—Distributedsystems;E.3[DataEncryption]:PublicKeyCryptosystems
GeneralTerms:Security,Algorithms
AdditionalKeyWordsandPhrases:Proxyre-encryption,doubledecryption,keytranslation,
bilinearmaps
UCTION
Proxyre-encryptionallowsaproxytotransformaciphertextcomputedunder
Alice’spublickeyintoonethatcanbeopenedbyBob’re
Authors’addresses:se,;DepartmentofComputerScience;TheJohnsHopkins
University;sSt.;Baltimore,MD21218;;DepartmentofComputerScience;
140GovernorsDrive;UniversityofMassachusetts;Amherst,MA01003-9264;erger;
ComputerScienceandArtificialIntelligenceLaboratory;MassachusettsInstituteofTechnology;
32VassarSt.;Cambridge,MA02139.
Permissiontomakedigitalorhardcopiesofpartorallofthisworkforpersonalorclassroomuseis
grantedwithoutfeeprovidedthatcopiesarenotmadeordistributedforprofitordirectcommercial
advantageandthatcopiesshowthisnoticeonthefirstpageorinitialscreenofadisplayalong
ghtsforcomponentsofthisworkownedbyothersthanACMmustbe
otherwise,torepublish,topostonservers,
toredistributetolists,ortouseanycomponentofthisworkinotherworksrequirespriorspecific
permissionand/sionsmayberequestedfromPublicationsDept.,ACM,Inc.,1515
Broadway,NewYork,NY10036USA,fax:+1(212)869-0481,orpermissions@.