existence of a light-weight encryption scheme E that
involves (at most) one modular exponentiation or one
multiplication such that E (x,y) gives the encryption
of y using x as the key. Decryption of this encryption
can be done using another procedure D(x, E (x, y))
to obtain y. Consider the same collection of pub-
lic keys pk
1
, pk
2
,... , pk
n
with the sequence of re-
encryption keys being rk
1→2
,rk
2→3
,... ,rk
(n−1)→n
.
As has been discussed in the bottom-up approach,
decryption key dk
i
can be obtained using secret key
sk
i+1
and rk
i→(i+1)
. Now if decryption key dk
i−1
is encrypted using E (dk
i
,dk
i−1
) and stored as ad-
ditional component of re-encryption key (as shown
in Table 3) rk
(i−1)→i
, then using rk
(i−1)→i
,rk
i→(i+1)
and sk
i+1
, one can obtain not only dk
i
but also dk
i−1
using D(dk
i
,E (dk
i
,dk
i−1
)). Therefore a direct re-
encryption key rk
(i−1)→(i+1)
can be derived using
dk
(i−1)
and sk
(i+1)
. Note that in this process, only
one secret key (sk
i+1
) is involved. So, participation of
only one user is required. This would facilitate deriva-
tion of dk
1
using sk
i
alone in the general case where
rk
1→2
,... ,rk
(n−1)→n
and pk
1
,... , pk
n
are given as se-
quences of re-encryption keys and public keys respec-
tively. Since this procedure requires chain of depen-
dent computations for obtaining subsequent decryp-
tion keys, these computations cannot be outsourced.
However, the direct re-encryption key obtained as a
result of this process can be given to anyone to carry
out re-encryption.
Table 3: Public, secret and re-encryption key components
and their values for approach defined in Section 4.4.2.
Component name Content
Public keys pk
i
Secret keys sk
i
,dk
i
= f
′
(sk
i
)
Re-encryption key (rk
(i−1)→i
)
f(dk
i−1
,ek
i
)
E (dk
i−1
,dk
i
)
5 CONCLUSIONS
In this paper, we have proposed an idea of using
proxy re-encryption satisfying special properties for
hierarchical key management. We observed that key
derivation cost in hierarchy can be reduced to a con-
stant (independent of depth) with all the computa-
tions to be done on re-encryption key level if a proxy
re-encryption scheme is unidirectional and transitive.
We note that there is no re-encryption scheme in lit-
erature that is both unidirectional and transitive. This
leads us to prove the concrete requirements for such a
re-encryption scheme. We claim that given the state-
of-the-art design of proxy re-encryption scheme, both
unidirectionality and transitivity cannot be achieved
simultaneously. We also suggest improvementson the
existing re-encryption schemes to achieve efficiency
comparable to the case with transitive-unidirectional
proxy re-encryption.
REFERENCES
Atallah, M. J., Blanton, M., Fazio, N., and Frikken, K. B.
(2009). Dynamic and efficient key management for
access hierarchies. ACM Transactions on Information
and System Security, 12(3):18:1–18:43.
Ateniese, G., Fu, K., Green, M., and Hohenberger, S.
(2006). Improved proxy re-encryption schemes with
applications to secure distributed storage. ACM Trans-
actions on Information and System Security, (TIS-
SEC’06), 9(1):1–30.
Blaze, M., Bleumer, G., and Strauss, M. (1998). Divert-
ible protocols and atomic proxy cryptography. In Ad-
vances in Cryptology-EUROCRYPT’98, pages 127–
144. Springer.
Canetti, R. and Hohenberger, S. (2007). Chosen-ciphertext
secure proxy re-encryption. In ACM Conference on
Computer and Communications Security, (CCS’07),
pages 185–194. ACM.
Chandran, N., Chase, M., Liu, F.-H., Nishimaki, R., and
Xagawa, K. (2014). Re-encryption, Functional Re-
encryption, and Multi-hop Re-encryption: A Frame-
work for Achieving Obfuscation-Based Security and
Instantiations from Lattices, pages 95–112. Springer,
Berlin, Heidelberg.
Dodis, Y. and Fazio, N. (2003). Public key trace and re-
voke scheme secure against adaptive chosen cipher-
text attack. In Proceedings of the 6th International
Workshop on Theory and Practice in Public Key Cryp-
tography: Public Key Cryptography, PKC ’03, pages
100–115, London, UK. Springer-Verlag.
Green, M. and Ateniese, G. (2007). Identity-based
proxy re-encryption. In 5th International Confer-
ence on Applied Cryptography and Network Security,
(ACNS’07), volume 4521 of Lecture Notes in Com-
puter Science, pages 288–306. Springer.
Libert, B. and Vergnaud, D. (2008). Unidirectional chosen-
ciphertext secure proxy re-encryption. In 11th Inter-
national Workshop on Practice and Theory in Public-
Key Cryptography, pages 360–379. Springer Berlin
Heidelberg.
Shao, J., Liu, P., Cao, Z., and Wei, G. (2011). Multi-
use unidirectional proxy re-encryption. In 2011 IEEE
International Conference on Communications (ICC),
pages 1–5.
Vimercati, S. D. C. D., Foresti, S., Jajodia, S., Paraboschi,
S., and Samarati, P. (2010). Encryption policies for
regulating access to outsourced data. ACM Transac-
tions on Database Systems, 35(2):12:1–12:46.