5 research outputs found
Non-Transferable Proxy Re-Encryption Scheme for Data Dissemination Control
A proxy re-encryption (PRE) scheme allows a proxy to re-encrypt
a ciphertext for Alice (delegator) to a ciphertext for Bob (delegatee) without
seeing the underlying plaintext. With the help of the proxy, Alice can delegate
the decryption right to any delegatee. However, existing PRE schemes generally
suffer from at least one of the followings. Some schemes fail to provide the
non-transferable property in which the proxy and the delegatee can collude to
further delegate the decryption right to anyone. This is the main open problem
left for PRE schemes. Other schemes assume the existence of a fully trusted
private key generator (PKG) to generate the re-encryption key to be used by
the proxy for re-encrypting a given ciphertext for a target delegatee. But this
poses two problems in PRE schemes if the PKG is malicious: the PKG in their
schemes may decrypt both original ciphertexts and re-encrypted ciphertexts
(referred as the key escrow problem); and the PKG can generate re-encryption
key for arbitrary delegatees without permission from the delegator (we refer
to it as the PKG despotism problem).
In this paper, we propose the first non-transferable proxy re-encryption
scheme which successfully achieves the non-transferable property. We also reduce
the full trust in PKG, only a limited amount of trust is placed in the proxy
and PKG. We show that the new scheme solved the PKG despotism problem
and key escrow problem as well. Further, we find that the new scheme satisfies
requirements of data dissemination control which is also a challenging
goal for data security. We explore the potential of adopting our new scheme
to achieve data dissemination control and implement a non-transferable re-encryption based encrypted PC/USB file system. Performance measurements
of our scheme demonstrate that non-transferable re-encryption is practical and
efficient
Secure and privacy-preserving protocols for VANETs
published_or_final_versionComputer ScienceDoctoralDoctor of Philosoph
Novel algorithms to improve internet traffic distribution management
published_or_final_versiontocabstractElectrical and Electronic EngineeringMasterMaster of Philosoph
SPCS: Secure and Privacy-Preserving Charging-Station Searching Using VANET
Electric vehicle has attracted more and more attention all around the world in recent years because of its many advantages such as low pollution to the environment. However, due to the limitation of current technology, charging remains an important issue. In this paper, we study the problem of finding and making reservation on charging stations via a vehicular ad hoc network (VANET). Our focus is on the privacy concern as drivers would not like to be traced by knowing which charging stations they have visited. Technically, we make use of the property of blind signature to achieve this goal. In brief, an electric vehicle first generates a set of anonymous credentials on its own. A trusted authority then blindly signs on them after verifying the identity of the vehicle. After that, the vehicle can make charging station searching queries and reservations by presenting those signed anonymous credentials. We implemented the scheme and show that the credential signing process (expected to be the most time consuming step) can be completed within reasonable time when the parameters are properly set. In particular, the process can be completed in 5 minutes when 1024 bits of RSA signing key is used. Moreover, we show that our scheme is secure in terms of authentication and privacy-preserving