TY - GEN
T1 - Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
AU - Ateniese, Giuseppe
AU - Fu, Kevin
AU - Green, Matthew
AU - Hohenberger, Susan
N1 - Publisher Copyright:
© 2005 Proceedings of the Symposium on Network and Distributed System Security, NDSS 2005. All Rights Reserved.
PY - 2005
Y1 - 2005
N2 - In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. We predict that fast and secure re-encryption will become increasingly popular as a method for managing encrypted file systems. Although efficiently computable, the wide-spread adoption of BBS re-encryption has been hindered by considerable security risks. Following recent work of Ivan and Dodis, we present new re-encryption schemes that realize a stronger notion of security and we demonstrate the usefulness of proxy re-encryption as a method of adding access control to the SFS read-only file system. Performance measurements of our experimental file system demonstrate that proxy re-encryption can work effectively in practice.
AB - In 1998, Blaze, Bleumer, and Strauss proposed an application called atomic proxy re-encryption, in which a semi-trusted proxy converts a ciphertext for Alice into a ciphertext for Bob without seeing the underlying plaintext. We predict that fast and secure re-encryption will become increasingly popular as a method for managing encrypted file systems. Although efficiently computable, the wide-spread adoption of BBS re-encryption has been hindered by considerable security risks. Following recent work of Ivan and Dodis, we present new re-encryption schemes that realize a stronger notion of security and we demonstrate the usefulness of proxy re-encryption as a method of adding access control to the SFS read-only file system. Performance measurements of our experimental file system demonstrate that proxy re-encryption can work effectively in practice.
UR - http://www.scopus.com/inward/record.url?scp=85180411878&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85180411878&partnerID=8YFLogxK
M3 - Conference contribution
AN - SCOPUS:85180411878
T3 - Proceedings of the Symposium on Network and Distributed System Security, NDSS 2005
BT - Proceedings of the Symposium on Network and Distributed System Security, NDSS 2005
T2 - 12th Symposium on Network and Distributed System Security, NDSS 2005
Y2 - 3 February 2005
ER -