Encryption and signatures are two of the most fundamental cryptographic tools, enabling private and authentic communication. Yet, their adoption in applications, such as email, distributed storage, digital rights management and health care systems, has been slow. A primary reason is that many common operations that arise when using these tools in practice create (sometimes insurmountable) key management problems. This research studies how to design encryption and signature schemes with greater key management flexibility.

In particular, this research focuses on situations where data encrypted (or signed) under one cryptographic key needs to be re-encrypted (or re-signed) under another cryptographic key by a semi-trusted proxy given special information. For example, suppose Alice wants her mail server to forward her encrypted email to Bob without being able to read her messages. Investigators will broaden the theoretical foundations of proxy re-cryptography and work with industry partners to evaluate their performance in practice. The research will study the application of proxy re-signatures for maintaining the integrity of dynamic content distribution of documents on the Web.

Graduate students and women researchers will be involved in all aspects of this project, collaborating on both the theory and practice. Techniques derived from this research will be incorporated into cryptography and computer security courses at both universities. Thus, this project will help develop future well-rounded scientists able to design and apply cryptographic tools.

Project Start
Project End
Budget Start
2007-09-01
Budget End
2010-08-31
Support Year
Fiscal Year
2007
Total Cost
$213,163
Indirect Cost
Name
Johns Hopkins University
Department
Type
DUNS #
City
Baltimore
State
MD
Country
United States
Zip Code
21218