Efficient provable dual receiver hybrid and light weight public key schemes based on the discrete logarithm problem without pairings

Eman Abouelkheir
DOI: https://doi.org/10.1049/cmu2.12836
IF: 1.345
2024-09-20
IET Communications
Abstract:Two proxy re‐encryption schemes for dual receivers without pairings are the objective of this paper. The initial approach is DR‐LWPRE‐WP, a lightweight proxy re‐encryption scheme that employs a public key scheme to alleviate concerns related to computational complexity. The DR‐HPRE‐WP hybrid proxy re‐encryption scheme, which incorporates public key and symmetric key schemes, is the second method. Assuming security based on the decisional Diffie–Hellman principle, both proposed schemes offer protection against selected plaintext attacks. In comparison to existing schemes that depend on pairings, the computational complexity is substantially diminished in the DR‐LWPRE‐WP scheme. Approximately 53% more computation is saved by DR‐LWPRE‐WP in comparison to pairing‐based schemes described in the literature. The computational efficacy of our proposed schemes confers significant benefits for resource‐constrained environments and practical implementations. Dual‐receiver proxy re‐encryption is a cryptographic technique that enables secure data sharing among multiple authorized users or entities. It has gained significant attention for its ability to manage access permissions, data confidentiality, and streamline communication channels. These schemes have been widely used in various applications, including healthcare systems, cloud computing, Internet of Things (IoT) systems, collaborative environments, and secure communication channels. This paper aims to propose two proxy re‐encryption schemes for dual receivers without pairings. The first is dual receiver lightweight proxy re‐encryption without pairings (DR‐LWPRE‐WP), which uses a public key scheme to reduce computational complexity. The second is dual receiver hybrid proxy re‐encryption without pairings (DR‐HPRE‐WP), which incorporates public key and symmetric key schemes. Both schemes offer protection against selected plaintext attacks based on the decisional Diffie‐Hellman principle. The DR‐LWPRE‐WP scheme reduces computation by approximately 53% compared to pairing‐based schemes, making it suitable for lightweight applications like the Internet of Things. The computational efficacy of these schemes offers significant benefits for resource‐constrained environments and practical implementations.
engineering, electrical & electronic
What problem does this paper attempt to address?