Performance Analysis of the Symmetric Proxy Re-encryption Scheme

Rizky Putri Meiliasari, Amril Syalim, Setiadi Yazid

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

3 Citations (Scopus)

Abstract

The use of cloud system's storage service has been increasing in recent years. A way to secure the stored data is to use cryptographic techniques. One of the techniques that can be used when sharing data accesses with other users, is proxy reencryption, which means converting data from its unreadable form (ciphertext) corresponding to one key into another ciphertext of a different key. Many proxy re-encryption schemes often only use asymmetric key cryptography, and not symmetric key. In this paper we analyze the performance of a symmetric proxy re-encryption scheme's implementation. In measuring the performance of the re-encryption function, the authors compare the running time of the program with that of AES CBC's reencryption's running time, to compare a naïve re-encryption with the selected schemes. We also propose some improvement to the implementation of the proxy re-encryption algorithm.

Original languageEnglish
Title of host publication2019 International Workshop on Big Data and Information Security, IWBIS 2019
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages91-96
Number of pages6
ISBN (Electronic)9781728153476
DOIs
Publication statusPublished - Oct 2019
Event2019 International Workshop on Big Data and Information Security, IWBIS 2019 - Bali, Indonesia
Duration: 11 Oct 2019 → …

Publication series

Name2019 International Workshop on Big Data and Information Security, IWBIS 2019

Conference

Conference2019 International Workshop on Big Data and Information Security, IWBIS 2019
Country/TerritoryIndonesia
CityBali
Period11/10/19 → …

Keywords

  • AES
  • Proxy re-encryption
  • symmetric key cryptography

Fingerprint

Dive into the research topics of 'Performance Analysis of the Symmetric Proxy Re-encryption Scheme'. Together they form a unique fingerprint.

Cite this