Skip to main content

Group Delegated ID-Based Proxy Re-encryption for PHR

  • Conference paper
  • First Online:
Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS 2020)

Abstract

In general, ID-based proxy re-encryption has the form of transferring data in a 1:1 manner between a data owner and data requestor. Therefore, only the data owner has the authority to decrypt or re-encrypt data encrypted with their public key. However, in an environment with data self-sovereignty, such as a personal health record, data are managed directly. In such circumstances, if the owner of the data becomes unconscious or unable to control the data, there is no way to obtain the data.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Heidelberg (1998)

    Google Scholar 

  2. Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Annual International Cryptology Conference. Springer, Heidelberg (2001)

    Google Scholar 

  3. Cocks, C.: An identity based encryption scheme based on quadratic residues. In: IMA International Conference on Cryptography and Coding. Springer, Heidelberg (2001)

    Google Scholar 

  4. Ivan, A.-A., Dodis, Y.: Proxy cryptography revisited. NDSS (2003)

    Google Scholar 

  5. Chiu, Y.-P., Lei, C.-L., Huang, C.-Y.: Secure multicast using proxy encryption. In: International Conference on Information and Communications Security. Springer, Heidelberg (2005)

    Google Scholar 

  6. Shao, J., et al.: Anonymous proxy re-encryption. Secur. Commun. Netw. 5(5), 439–449 (2012)

    Article  Google Scholar 

  7. Ateniese, G., et al.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 9(1), 1–30 (2006)

    Article  Google Scholar 

  8. Chu, C.-K., Tzeng, W.-G.: Identity-based proxy re-encryption without random oracles. In: Lecture Notes in Computer Science, pp. 189–202. Springer, Heidelberg (2007)

    Google Scholar 

  9. Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Applied Cryptography and Network Security, pp. 288–306. Springer, Heidelberg (2007)

    Google Scholar 

  10. Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Computer Security - ESORICS 2014, pp. 257–272. Springer International Publishing (2014)

    Google Scholar 

  11. Xu, L., Wu, X., Zhang, X.: CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (2012)

    Google Scholar 

  12. Zhao, X., Wei, D., Wang, H.: Asymmetric group key agreement with traitor traceability. In: 2010 International Conference on Computational Intelligence and Security (2010)

    Google Scholar 

Download references

Acknowledgments

This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2019R1A2C1085718) and the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2020-0-00403) supervised by the IITP (Institute for Information & communications Technology Planning & Evaluation).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Im-Yeong Lee .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Kim, WB., Lee, IY., Yim, KB. (2021). Group Delegated ID-Based Proxy Re-encryption for PHR. In: Barolli, L., Poniszewska-Maranda, A., Park, H. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2020. Advances in Intelligent Systems and Computing, vol 1195. Springer, Cham. https://doi.org/10.1007/978-3-030-50399-4_43

Download citation

Publish with us

Policies and ethics