TY - GEN
T1 - Realizing proxy re-encryption in the symmetric world
AU - Syalim, Amril
AU - Nishide, Takashi
AU - Sakurai, Kouichi
PY - 2011
Y1 - 2011
N2 - Proxy re-encryption is a useful concept and many proxy re-encryption schemes have been proposed in the asymmetric encryption setting. In the asymmetric encryption setting, proxy re-encryption can be beautifully implemented because many operations are available to directly transform a cipher to another cipher without the proxy needs to access the plaintexts. However, in many situations, for a better performance, the data is encrypted using symmetric ciphers. Most symmetric ciphers do not support proxy cryptography because of malleability (that is needed to implement the proxy re-encryption) is not a desired property in a secure encryption scheme. In this paper, we suggest an idea to implement a pure proxy re-encryption for the symmetric ciphers by first transforming the plaintext into a random sequence of blocks using an All or nothing transform (AONT). We show an example of the proxy re-encryption scheme using a weak encryption (i.e. simple permutation) that has a simple conversion function to convert a permutation to another. The encryption scheme exploits three characteristics of an AONT transformation: (1) the output of an AONT is a pseudorandom, (2) the output of an AONT cannot be transformed back if any parts is missing, and (3) the output of an AONT cannot be transformed back without having all blocks with correct position. We show security argument of the proposed scheme and its performance evaluation.
AB - Proxy re-encryption is a useful concept and many proxy re-encryption schemes have been proposed in the asymmetric encryption setting. In the asymmetric encryption setting, proxy re-encryption can be beautifully implemented because many operations are available to directly transform a cipher to another cipher without the proxy needs to access the plaintexts. However, in many situations, for a better performance, the data is encrypted using symmetric ciphers. Most symmetric ciphers do not support proxy cryptography because of malleability (that is needed to implement the proxy re-encryption) is not a desired property in a secure encryption scheme. In this paper, we suggest an idea to implement a pure proxy re-encryption for the symmetric ciphers by first transforming the plaintext into a random sequence of blocks using an All or nothing transform (AONT). We show an example of the proxy re-encryption scheme using a weak encryption (i.e. simple permutation) that has a simple conversion function to convert a permutation to another. The encryption scheme exploits three characteristics of an AONT transformation: (1) the output of an AONT is a pseudorandom, (2) the output of an AONT cannot be transformed back if any parts is missing, and (3) the output of an AONT cannot be transformed back without having all blocks with correct position. We show security argument of the proposed scheme and its performance evaluation.
KW - All or Nothing Transform (AONT)
KW - Database Encryption
KW - Proxy Re-encryption
KW - Symmetric Key Encryption
UR - http://www.scopus.com/inward/record.url?scp=82955177052&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-25327-0_23
DO - 10.1007/978-3-642-25327-0_23
M3 - Conference contribution
AN - SCOPUS:82955177052
SN - 9783642253263
T3 - Communications in Computer and Information Science
SP - 259
EP - 274
BT - Informatics Engineering and Information Science - International Conference, ICIEIS 2011, Proceeding
T2 - International Conference on Informatics Engineering and Information Science, ICIEIS 2011
Y2 - 14 November 2011 through 16 November 2011
ER -