Ciphertext-Independent and Unbounded Depth RSA-Based Updatable Encryption Scheme

Mostefa Kara, Abdelkader Laouid, Ahcene Bounceur, Mohammad Hammoudeh, Abid Mohamed Nadhir, Kahla Mohamed El Habib

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

We introduce a novel updatable encryption scheme based on the RSA cryptosystem to address the challenges of key rotation in secure communication systems. Updatable encryption allows ciphertexts encrypted under an old key to be transformed into ciphertexts under a new key without decrypting the plaintext, thereby enhancing security without compromising data integrity or confidentiality. Our RSA-based scheme leverages the mathematical properties of RSA to enable efficient and seamless key updates. We provide a security analysis demonstrating that our scheme is not vulnerable to information leaking. Experimental results indicate that our method offers a practical and efficient solution for large-scale systems that require regular key updates, with minimal impact on computational resources and performance.

Original languageEnglish
Title of host publication2024 1st International Conference on Innovative and Intelligent Information Technologies, IC3IT 2024
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9798331541064
DOIs
StatePublished - 2024
Event1st International Conference on Innovative and Intelligent Information Technologies, IC3IT 2024 - Batna, Algeria
Duration: 3 Dec 20245 Dec 2024

Publication series

Name2024 1st International Conference on Innovative and Intelligent Information Technologies, IC3IT 2024

Conference

Conference1st International Conference on Innovative and Intelligent Information Technologies, IC3IT 2024
Country/TerritoryAlgeria
CityBatna
Period3/12/245/12/24

Bibliographical note

Publisher Copyright:
© 2024 IEEE.

Keywords

  • Encryption key rotation
  • Untrusted cloud Reencryption

ASJC Scopus subject areas

  • Artificial Intelligence
  • Computer Science Applications
  • Computer Vision and Pattern Recognition
  • Human-Computer Interaction
  • Signal Processing
  • Software

Fingerprint

Dive into the research topics of 'Ciphertext-Independent and Unbounded Depth RSA-Based Updatable Encryption Scheme'. Together they form a unique fingerprint.

Cite this