Please use this identifier to cite or link to this item: http://dr.iiserpune.ac.in:8080/xmlui/handle/123456789/201
Full metadata record
DC FieldValueLanguage
dc.contributor.advisorRangan, C. Panduen_US
dc.contributor.authorHAMBARDIKAR, KARTIK Den_US
dc.date.accessioned2012-05-07T10:49:31Z
dc.date.available2012-05-07T10:49:31Z
dc.date.issued2012-05en_US
dc.identifier.urihttp://dr.iiserpune.ac.in:8080/xmlui/handle/123456789/201-
dc.descriptionProject under Prof. C. Pandurangan , at Theoretical Computer Science Lab , Indian Institute Of Technology, Madras.en_US
dc.description.abstractIn a proxy re-encryption (PRE) scheme, a proxy, authorized by Alice, transforms messages encrypted under Alices public key into encryptions under Bobs public key without learning anything about the underlying message(plaintext). In an Identity- Based Encryption the public key of a user is some unique information about the identity of the user, usually the user's email-ID. When Alice sends mail to Bob at "bob@company.com" she simply encrypts her message using the public key string "bob@company.com". There is no need for Alice to obtain Bobs public key certi - cate. When Bob receives the encrypted mail he contacts a third party, which we call the Private Key Generator (PKG) authenticates himself and then obtains the private key for himself. Finding a unidirectional, multi-use, and CCA2-secure identity-based proxy re-encryption scheme was presented as an open problem by Green et al. In 2010 Wang et.al. pro- posed a Multi-Use Identity Based Proxy Re-encryption Scheme[25] as the solution to the open problem. In this thesis, we have identi ed a security attack on [25] and also show that the attack is within the scope of the established security model[25].In a proxy re-encryption (PRE) scheme, a proxy, authorized by Alice, transforms messages encrypted under Alices public key into encryptions under Bobs public key without learning anything about the underlying message(plaintext). In an Identity- Based Encryption the public key of a user is some unique information about the identity of the user, usually the user's email-ID. When Alice sends mail to Bob at "bob@company.com" she simply encrypts her message using the public key string "bob@company.com". There is no need for Alice to obtain Bobs public key certi - cate. When Bob receives the encrypted mail he contacts a third party, which we call the Private Key Generator (PKG) authenticates himself and then obtains the private key for himself. Finding a unidirectional, multi-use, and CCA2-secure identity-based proxy re-encryption scheme was presented as an open problem by Green et al. In 2010 Wang et.al. pro- posed a Multi-Use Identity Based Proxy Re-encryption Scheme[25] as the solution to the open problem. In this thesis, we have identi ed a security attack on [25] and also show that the attack is within the scope of the established security model[25].en_US
dc.language.isoenen_US
dc.subject2012
dc.titleOn the security of Multi-Use Identity Based Proxy Re-Encryptionen_US
dc.typeThesisen_US
dc.type.degreeBS-MSen_US
dc.contributor.departmentDept. of Mathematicsen_US
dc.contributor.registration20071051en_US
Appears in Collections:MS THESES

Files in This Item:
File Description SizeFormat 
kartik thesis.pdf300.65 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.