Abstract
In general, ID-based proxy re-encryption has the form of transferring data in a 1:1 manner between a data owner and data requestor. Therefore, only the data owner has the authority to decrypt or re-encrypt data encrypted with their public key. However, in an environment with data self-sovereignty, such as a personal health record, data are managed directly. In such circumstances, if the owner of the data becomes unconscious or unable to control the data, there is no way to obtain the data.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Blaze, M., Bleumer, G., Strauss, M.: Divertible protocols and atomic proxy cryptography. In: International Conference on the Theory and Applications of Cryptographic Techniques. Springer, Heidelberg (1998)
Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Annual International Cryptology Conference. Springer, Heidelberg (2001)
Cocks, C.: An identity based encryption scheme based on quadratic residues. In: IMA International Conference on Cryptography and Coding. Springer, Heidelberg (2001)
Ivan, A.-A., Dodis, Y.: Proxy cryptography revisited. NDSS (2003)
Chiu, Y.-P., Lei, C.-L., Huang, C.-Y.: Secure multicast using proxy encryption. In: International Conference on Information and Communications Security. Springer, Heidelberg (2005)
Shao, J., et al.: Anonymous proxy re-encryption. Secur. Commun. Netw. 5(5), 439–449 (2012)
Ateniese, G., et al.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. (TISSEC) 9(1), 1–30 (2006)
Chu, C.-K., Tzeng, W.-G.: Identity-based proxy re-encryption without random oracles. In: Lecture Notes in Computer Science, pp. 189–202. Springer, Heidelberg (2007)
Green, M., Ateniese, G.: Identity-based proxy re-encryption. In: Applied Cryptography and Network Security, pp. 288–306. Springer, Heidelberg (2007)
Liang, K., Liu, J.K., Wong, D.S., Susilo, W.: An efficient cloud-based revocable identity-based proxy re-encryption scheme for public clouds data sharing. In: Computer Security - ESORICS 2014, pp. 257–272. Springer International Publishing (2014)
Xu, L., Wu, X., Zhang, X.: CL-PRE: a certificateless proxy re-encryption scheme for secure data sharing with public cloud. In: Proceedings of the 7th ACM Symposium on Information, Computer and Communications Security (2012)
Zhao, X., Wei, D., Wang, H.: Asymmetric group key agreement with traitor traceability. In: 2010 International Conference on Computational Intelligence and Security (2010)
Acknowledgments
This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (NRF-2019R1A2C1085718) and the MSIT (Ministry of Science and ICT), Korea, under the ITRC (Information Technology Research Center) support program (IITP-2020-0-00403) supervised by the IITP (Institute for Information & communications Technology Planning & Evaluation).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 Springer Nature Switzerland AG
About this paper
Cite this paper
Kim, WB., Lee, IY., Yim, KB. (2021). Group Delegated ID-Based Proxy Re-encryption for PHR. In: Barolli, L., Poniszewska-Maranda, A., Park, H. (eds) Innovative Mobile and Internet Services in Ubiquitous Computing . IMIS 2020. Advances in Intelligent Systems and Computing, vol 1195. Springer, Cham. https://doi.org/10.1007/978-3-030-50399-4_43
Download citation
DOI: https://doi.org/10.1007/978-3-030-50399-4_43
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-50398-7
Online ISBN: 978-3-030-50399-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)