Vol.2, No.1, 2020, pp.1-8, doi:10.32604/jcs.2020.05878
OPEN ACCESS
ARTICLE
The Development of Proxy Re-Encryption
  • Yepeng Liu1, 2, Yongjun Ren1, 2, *, Qirun Wang3, Jinyue Xia4
1 School of Computer and Software, Nanjing University of Information Science & Technology, Nanjing, 210044, China.
2 Jiangsu Collaborative Innovation Center of Atmospheric Environment and Equipment Technology, Nanjing University of Information Science & Technology, Nanjing, China.
3 School of Engineering and Technology, University of Hertfordshire, Hertford, UK.
4 International Business Machines Corporation (IBM), New York, USA.
* Corresponding Author: Yongjun Ren. Email:
Abstract
With the diversification of electronic devices, cloud-based services have become the link between different devices. As a cryptosystem with secure conversion function, proxy re-encryption enables secure sharing of data in a cloud environment. Proxy re-encryption is a public key encryption system with ciphertext security conversion function. A semi-trusted agent plays the role of ciphertext conversion, which can convert the user ciphertext into the same plaintext encrypted by the principal’s public key. Proxy re-encryption has been a hotspot in the field of information security since it was proposed by Blaze et al. [Blaze, Bleumer and Strauss (1998)]. After 20 years of development, proxy re-encryption has evolved into many forms been widely used. This paper elaborates on the definition, characteristics and development status of proxy re-encryption, and classifies proxy re-encryption from the perspectives of user identity, conversion condition, conversion hop count and conversion direction. The aspects of the existing program were compared and briefly reviewed from the aspects of features, performance, and security. Finally, this paper looks forward to the possible development direction of proxy reencryption in the future.
Keywords
Proxy re-encryption, bilinear pairing, information security.
Cite This Article
. , "The development of proxy re-encryption," Journal of Cyber Security, vol. 2, no.1, pp. 1–8, 2020.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.