A certificate-based proxy cryptosystem with revocable proxy decryption power

被引:0
|
作者
Wang, Lihua [1 ]
Shao, Jun [2 ]
Cao, Zhenfu [2 ]
Mambo, Masahiro [3 ]
Yamamura, Akihiro [1 ]
机构
[1] Natl Inst Informat & Commun Technol, Informat Secur Ctr, Koganei, Tokyo 1848795, Japan
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[3] Univ Tsukuba, Grad Sch Syst & Informat, Tsukuba, Ibaraki 3058573, Japan
来源
关键词
proxy cryptosystem; pairing; certificate-based encryption (CBE);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a proxy cryptosystem based on a certificate-based encryption scheme. The proposed scheme inherits the merits of certificate-based encryption systems: no-key-escrow and implicit certification. In addition, the proposed scheme allows the proxy's decryption power to be revoked even during the valid period of the proxy key without changing the original decryptor's public information. Few proxy schemes have this property, and ours is more efficient than the existing ones. We show that our proposal is IND-CBPd-Rev-CCA secure under the bilinear Diffie-Hellman assumption in the random oracle model.
引用
收藏
页码:297 / 311
页数:15
相关论文
共 50 条
  • [1] Certificate-based proxy decryption systems with revocability in the standard model
    Wang, Lihua
    Shao, Jun
    Cao, Zhenfu
    Mambo, Masahiro
    Yamamura, Akihiro
    Wang, Licheng
    INFORMATION SCIENCES, 2013, 247 : 188 - 201
  • [2] Certificate-Based Conditional Proxy Re-Encryption
    Li, Jiguo
    Zhao, Xuexia
    Zhang, Yichen
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 299 - 310
  • [3] Provably Secure Certificate-based Proxy Signature Schemes
    Li, Jiguo
    Xu, Lizhong
    Zhang, Yichen
    JOURNAL OF COMPUTERS, 2009, 4 (06) : 444 - 452
  • [4] Short certificate-based proxy signature scheme from pairings
    Verma, Girraj Kumar
    Singh, B. B.
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2017, 28 (12):
  • [5] A Generic Conversion from Proxy Signatures to Certificate-based Signatures
    Huang, Rufen
    Huang, Zhenjie
    Chen, Qunshan
    JOURNAL OF INTERNET TECHNOLOGY, 2021, 22 (01): : 209 - 217
  • [6] Provably Secure Certificate-based Conditional Proxy Re-encryption
    Li, Jiguo
    Zhao, Xuexia
    Zhang, Yichen
    Yao, Wei
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2016, 32 (04) : 813 - 830
  • [7] Security weakness of a certificate-based proxy signature scheme for IIoT environments
    Park, Je Hong
    Kim, Woo-Hwan
    INFORMATION PROCESSING LETTERS, 2024, 183
  • [8] A certificate-based proxy signature with message recovery without bilinear pairing
    Mahmoodi, Ali
    Mohajery, Javad
    Salmasizadeh, Mahmoud
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 4983 - 4991
  • [9] A New Certificate-Based Proxy Blind Signature Scheme with Batch Verification
    Nong Qiang
    Wu Shunxiang
    ICCSE 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION: ADVANCED COMPUTER TECHNOLOGY, NEW EDUCATION, 2008, : 553 - 557
  • [10] An efficient and provable certificate-based proxy signature scheme for IIoT environment
    Verma, Girraj Kumar
    Singh, B. B.
    Kumar, Neeraj
    Obaidat, Mohammad S.
    He, Debiao
    Singh, Harendra
    INFORMATION SCIENCES, 2020, 518 : 142 - 156