EconPapers    
Economics at your fingertips  
 

Time‐and‐ID‐Based Proxy Reencryption Scheme

Kambombo Mtonga, Anand Paul and Seungmin Rho

Journal of Applied Mathematics, 2014, vol. 2014, issue 1

Abstract: Time‐ and ID‐based proxy reencryption scheme is proposed in this paper in which a type‐based proxy reencryption enables the delegator to implement fine‐grained policies with one key pair without any additional trust on the proxy. However, in some applications, the time within which the data was sampled or collected is very critical. In such applications, for example, healthcare and criminal investigations, the delegatee may be interested in only some of the messages with some types sampled within some time bound instead of the entire subset. Hence, in order to carter for such situations, in this paper, we propose a time‐and‐identity‐based proxy reencryption scheme that takes into account the time within which the data was collected as a factor to consider when categorizing data in addition to its type. Our scheme is based on Boneh and Boyen identity‐based scheme (BB‐IBE) and Matsuo’s proxy reencryption scheme for identity‐based encryption (IBE to IBE). We prove that our scheme is semantically secure in the standard model.

Date: 2014
References: Add references at CitEc
Citations:

Downloads: (external link)
https://doi.org/10.1155/2014/329198

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:wly:jnljam:v:2014:y:2014:i:1:n:329198

Access Statistics for this article

More articles in Journal of Applied Mathematics from John Wiley & Sons
Bibliographic data for series maintained by Wiley Content Delivery ().

 
Page updated 2025-03-22
Handle: RePEc:wly:jnljam:v:2014:y:2014:i:1:n:329198