A certificate-based proxy cryptosystem with revocable proxy decryption power

被引:0
|
作者
Wang, Lihua [1 ]
Shao, Jun [2 ]
Cao, Zhenfu [2 ]
Mambo, Masahiro [3 ]
Yamamura, Akihiro [1 ]
机构
[1] Natl Inst Informat & Commun Technol, Informat Secur Ctr, Koganei, Tokyo 1848795, Japan
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[3] Univ Tsukuba, Grad Sch Syst & Informat, Tsukuba, Ibaraki 3058573, Japan
来源
关键词
proxy cryptosystem; pairing; certificate-based encryption (CBE);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a proxy cryptosystem based on a certificate-based encryption scheme. The proposed scheme inherits the merits of certificate-based encryption systems: no-key-escrow and implicit certification. In addition, the proposed scheme allows the proxy's decryption power to be revoked even during the valid period of the proxy key without changing the original decryptor's public information. Few proxy schemes have this property, and ours is more efficient than the existing ones. We show that our proposal is IND-CBPd-Rev-CCA secure under the bilinear Diffie-Hellman assumption in the random oracle model.
引用
收藏
页码:297 / 311
页数:15
相关论文
共 50 条
  • [21] Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks
    李发根
    高军涛
    刘双根
    胡予濮
    Journal of Shanghai Jiaotong University(Science), 2006, (02) : 152 - 157
  • [22] Key management using certificate-based cryptosystem in ad hoc networks
    Key Lab. of Computer Networks and Information Security, Xidian Univ., Xi'an 710071, China
    J. Shanghai Jiaotong Univ. Sci., 2006, 2 (152-157):
  • [23] Anonymous, Timed and Revocable Proxy Signatures
    Almashagbeh, Ghada
    Nitulescu, Anca
    INFORMATION SECURITY, PT I, ISC 2024, 2025, 15257 : 23 - 43
  • [24] A Lightweight and Secured Certificate-Based Proxy Signcryption (CB-PS) Scheme for E-Prescription Systems
    Ullah, Insaf
    Ul Amin, Noor
    Almogren, Ahmad
    Khan, Muhammad Asghar
    Uddin, M. Irfan
    Hua, Qiaozhi
    IEEE ACCESS, 2020, 8 (08): : 199197 - 199212
  • [25] Constructing secure proxy cryptosystem
    Zhou, Y
    Cao, ZF
    Chai, ZC
    INFORMATION SECURITY AND CRYPTOLOGY, PROCEEDINGS, 2005, 3822 : 150 - 161
  • [26] Anonymity revocable proxy signature scheme
    Fu Xiaotong
    Xiao Guozhen
    CHINESE JOURNAL OF ELECTRONICS, 2006, 15 (04): : 718 - 720
  • [27] Revocable certificate-based broadcast signcryption scheme for edge-enabled IIoT
    Gao, Yan
    Deng, Lunzhi
    Liu, Huan
    Li, Binhan
    Wang, Na
    INFORMATION SCIENCES, 2025, 690
  • [28] Revocable attribute-based proxy re-encryption
    Luo, Fucai
    Al-Kuwari, Saif
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2021, 15 (01) : 465 - 482
  • [29] A generalized proxy signature scheme based on the RSA cryptosystem
    Xue, QS
    Cao, ZF
    Qian, HF
    PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 662 - 665
  • [30] Revocable proxy signature scheme with efficient multiple delegations to the same proxy signer
    Lee, Ji-Seon
    Chang, Jik Hyun
    INNOVATIVE ALGORITHMS AND TECHNIQUES IN AUTOMATION, INDUSTRIAL ELECTRONICS AND TELECOMMUNICATIONS, 2007, : 193 - 197