Abstract : | Proxy re-encryption [1] is a novel cryptographic technique that allows a semi-trusted third party (the proxy) to transform a ciphertext encrypted with a public key A, into a ciphertext encrypted with a public key B, by learning nothing about the plaintext. Proxy re-encryption appears to be of particular interest in scenarios that involve transmission of cacheable content in an encrypted form. Transmitting content in an encrypted form is highly desirable from a user perspective, as it prevents eavesdroppers from monitoring users’ interests. On the other hand the caching of encrypted content is of limited value,since the cached ciphertexts can only be accessed by users that know the decryption key. The purpose of this thesis is to explore and evaluate various proxy re-encryption schemes, in the context of ICN, and to propose a solution that will enable a) the encryption of content by the source, using a single generic key and b) the re-encryption of content by caches, into a form that can be decrypted by a particular user.
|
---|