A certificate-based proxy cryptosystem with revocable proxy decryption power

被引:0
|
作者
Wang, Lihua [1 ]
Shao, Jun [2 ]
Cao, Zhenfu [2 ]
Mambo, Masahiro [3 ]
Yamamura, Akihiro [1 ]
机构
[1] Natl Inst Informat & Commun Technol, Informat Secur Ctr, Koganei, Tokyo 1848795, Japan
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[3] Univ Tsukuba, Grad Sch Syst & Informat, Tsukuba, Ibaraki 3058573, Japan
来源
关键词
proxy cryptosystem; pairing; certificate-based encryption (CBE);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a proxy cryptosystem based on a certificate-based encryption scheme. The proposed scheme inherits the merits of certificate-based encryption systems: no-key-escrow and implicit certification. In addition, the proposed scheme allows the proxy's decryption power to be revoked even during the valid period of the proxy key without changing the original decryptor's public information. Few proxy schemes have this property, and ours is more efficient than the existing ones. We show that our proposal is IND-CBPd-Rev-CCA secure under the bilinear Diffie-Hellman assumption in the random oracle model.
引用
收藏
页码:297 / 311
页数:15
相关论文
共 50 条
  • [31] Pairing-Free Certificate-Based Proxy Re-Encryption Plus Scheme for Secure Cloud Data Sharing
    Yan, Lu
    Qin, Haozhe
    Yang, Kexin
    Xie, Heye
    Wang, Xu An
    Liu, Shuanggen
    ELECTRONICS, 2024, 13 (03)
  • [32] A pairing-free certificate-based proxy re-encryption scheme for secure data sharing in public clouds
    Lu, Yang
    Li, Jiguo
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 62 : 140 - 147
  • [33] Secure Vehicle-to-roadside Communication Protocol Using Certificate-based Cryptosystem
    Xiong, Hu
    Qin, Zhiguang
    Li, Fagen
    IETE TECHNICAL REVIEW, 2010, 27 (03) : 214 - 219
  • [34] On the Security of a Proxy Ring Signature with Revocable Anonymity
    Zhang, Jianhong
    Yang, Yixian
    MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 205 - +
  • [35] How to construct secure proxy cryptosystem
    Zhou, Yuan
    Fang, Binxing
    Cao, Zhenfu
    Yun, Xiaochun
    Cheng, Xiaoming
    INFORMATION SCIENCES, 2007, 177 (19) : 4095 - 4108
  • [36] On the Security of a Proxy Ring Signature with Revocable Anonymity
    Zhang, Jianhong
    Li, Pengyan
    JOURNAL OF INTERNET TECHNOLOGY, 2015, 16 (07): : 1169 - 1175
  • [37] A Proxy Ring Signature Scheme with Revocable Anonymity Based on Bilinear Pairings
    Wang, Huaqun
    JOURNAL OF INTERNET TECHNOLOGY, 2010, 11 (05): : 627 - 632
  • [38] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui Electronic Technology Institute Information Engineering University Zhengzhou China
    Journal of Electronics, 2006, (01) : 54 - 57
  • [39] Efficient proxy multisignature schemes based on the elliptic curve cryptosystem
    Chen, TS
    Chung, YF
    Huang, GS
    COMPUTERS & SECURITY, 2003, 22 (06) : 527 - 534
  • [40] A Hyperelliptic Curve Cryptosystem Based Proxy Promised Signcryption Scheme
    Khan, Farhad Ullah
    Algarni, Fahad
    Ullah, Insaf
    Karamti, Hanen
    Manzar, Muhammad Anwaar
    Alzahrani, Ahmed Saeed
    Aziz, Muhammad Adnan
    Khan, Muhammad Asghar
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022