Digital Repository

On the security of Multi-Use Identity Based Proxy Re-Encryption

Show simple item record

dc.contributor.advisor Rangan, C. Pandu en_US
dc.contributor.author HAMBARDIKAR, KARTIK D en_US
dc.date.accessioned 2012-05-07T10:49:31Z
dc.date.available 2012-05-07T10:49:31Z
dc.date.issued 2012-05 en_US
dc.identifier.uri http://dr.iiserpune.ac.in:8080/xmlui/handle/123456789/201
dc.description Project under Prof. C. Pandurangan , at Theoretical Computer Science Lab , Indian Institute Of Technology, Madras. en_US
dc.description.abstract In a proxy re-encryption (PRE) scheme, a proxy, authorized by Alice, transforms messages encrypted under Alices public key into encryptions under Bobs public key without learning anything about the underlying message(plaintext). In an Identity- Based Encryption the public key of a user is some unique information about the identity of the user, usually the user's email-ID. When Alice sends mail to Bob at "bob@company.com" she simply encrypts her message using the public key string "bob@company.com". There is no need for Alice to obtain Bobs public key certi - cate. When Bob receives the encrypted mail he contacts a third party, which we call the Private Key Generator (PKG) authenticates himself and then obtains the private key for himself. Finding a unidirectional, multi-use, and CCA2-secure identity-based proxy re-encryption scheme was presented as an open problem by Green et al. In 2010 Wang et.al. pro- posed a Multi-Use Identity Based Proxy Re-encryption Scheme[25] as the solution to the open problem. In this thesis, we have identi ed a security attack on [25] and also show that the attack is within the scope of the established security model[25].In a proxy re-encryption (PRE) scheme, a proxy, authorized by Alice, transforms messages encrypted under Alices public key into encryptions under Bobs public key without learning anything about the underlying message(plaintext). In an Identity- Based Encryption the public key of a user is some unique information about the identity of the user, usually the user's email-ID. When Alice sends mail to Bob at "bob@company.com" she simply encrypts her message using the public key string "bob@company.com". There is no need for Alice to obtain Bobs public key certi - cate. When Bob receives the encrypted mail he contacts a third party, which we call the Private Key Generator (PKG) authenticates himself and then obtains the private key for himself. Finding a unidirectional, multi-use, and CCA2-secure identity-based proxy re-encryption scheme was presented as an open problem by Green et al. In 2010 Wang et.al. pro- posed a Multi-Use Identity Based Proxy Re-encryption Scheme[25] as the solution to the open problem. In this thesis, we have identi ed a security attack on [25] and also show that the attack is within the scope of the established security model[25]. en_US
dc.language.iso en en_US
dc.subject 2012
dc.title On the security of Multi-Use Identity Based Proxy Re-Encryption en_US
dc.type Thesis en_US
dc.type.degree BS-MS en_US
dc.contributor.department Dept. of Mathematics en_US
dc.contributor.registration 20071051 en_US


Files in this item

This item appears in the following Collection(s)

  • MS THESES [1705]
    Thesis submitted to IISER Pune in partial fulfilment of the requirements for the BS-MS Dual Degree Programme/MSc. Programme/MS-Exit Programme

Show simple item record

Search Repository


Advanced Search

Browse

My Account