Improved proxy re-encryption schemes with applications to secure distributed storage

G Ateniese, K Fu, M Green… - ACM Transactions on …, 2006 - dl.acm.org
ACM Transactions on Information and System Security (TISSEC), 2006dl.acm.org
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed an application called atomic proxy re-
encryption, in which a semitrusted proxy converts a ciphertext for Alice into a ciphertext for
Bob without seeing the underlying plaintext. We predict that fast and secure re-encryption
will become increasingly popular as a method for managing encrypted file systems.
Although efficiently computable, the wide-spread adoption of BBS re-encryption has been
hindered by considerable security risks. Following recent work of Dodis and Ivan, we …
In 1998, Blaze, Bleumer, and Strauss (BBS) proposed an application called atomic proxy re-encryption, in which a semitrusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. We predict that fast and secure re-encryption will become increasingly popular as a method for managing encrypted file systems. Although efficiently computable, the wide-spread adoption of BBS re-encryption has been hindered by considerable security risks. Following recent work of Dodis and Ivan, we present new re-encryption schemes that realize a stronger notion of security and demonstrate the usefulness of proxy re-encryption as a method of adding access control to a secure file system. Performance measurements of our experimental file system demonstrate that proxy re-encryption can work effectively in practice.
ACM Digital Library
以上显示的是最相近的搜索结果。 查看全部搜索结果