A certificate-based proxy cryptosystem with revocable proxy decryption power

被引:0
|
作者
Wang, Lihua [1 ]
Shao, Jun [2 ]
Cao, Zhenfu [2 ]
Mambo, Masahiro [3 ]
Yamamura, Akihiro [1 ]
机构
[1] Natl Inst Informat & Commun Technol, Informat Secur Ctr, Koganei, Tokyo 1848795, Japan
[2] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200240, Peoples R China
[3] Univ Tsukuba, Grad Sch Syst & Informat, Tsukuba, Ibaraki 3058573, Japan
来源
关键词
proxy cryptosystem; pairing; certificate-based encryption (CBE);
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present a proxy cryptosystem based on a certificate-based encryption scheme. The proposed scheme inherits the merits of certificate-based encryption systems: no-key-escrow and implicit certification. In addition, the proposed scheme allows the proxy's decryption power to be revoked even during the valid period of the proxy key without changing the original decryptor's public information. Few proxy schemes have this property, and ours is more efficient than the existing ones. We show that our proposal is IND-CBPd-Rev-CCA secure under the bilinear Diffie-Hellman assumption in the random oracle model.
引用
收藏
页码:297 / 311
页数:15
相关论文
共 50 条
  • [41] A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
    Hu Bin Jin Chenhui (Electronic Technology Institute
    Journal of Electronics(China), 2006, (01) : 54 - 57
  • [42] An improved threshold proxy signature scheme based on the RSA cryptosystem
    Xue, QS
    Cao, ZF
    Tang, FL
    PDPTA '04: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED PROCESSING TECHNIQUES AND APPLICATIONS, VOLS 1-3, 2004, : 901 - 907
  • [43] A traceable proxy multisignature scheme based on the elliptic curve cryptosystem
    Chen, TS
    Chung, YF
    Huang, KH
    APPLIED MATHEMATICS AND COMPUTATION, 2004, 159 (01) : 137 - 145
  • [44] Lightweight mutual authentication based on proxy certificate trust list
    Xin, L
    Ogawa, M
    PARALLEL AND DISTRIBUTED COMPUTING: APPLICATIONS AND TECHNOLOGIES, PROCEEDINGS, 2004, 3320 : 628 - 632
  • [45] Security analysis of a proxy signature scheme based on the elliptic curve cryptosystem
    Wu, Y
    Zhang, YP
    Cao, TJ
    SAM '05: PROCEEDINGS OF THE 2005 INTERNATIONAL CONFERENCE ON SECURITY AND MANAGEMENT, 2005, : 58 - 64
  • [46] Certificate-based encryption and the certificate revocation problem
    Gentry, C
    ADVANCES IN CRYPTOLOGY-EUROCRYPT 2003, 2003, 2656 : 272 - 293
  • [47] Delegation using a proxy certificate in on-line
    Kim, T
    Cho, S
    Jin, S
    7TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL II, PROCEEDINGS: COMPUTER SCIENCE AND ENGINEERING, 2003, : 80 - 83
  • [48] A certificate-based signature scheme
    Kang, BG
    Park, JH
    Hahn, SG
    TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 99 - 111
  • [49] Efficient certificate-based encryption and hierarchical certificate-based encryption schemes in the standard model
    Hwang, Seong Oun
    Le, Minh-Ha
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2018, 35 (06) : 5971 - 5981
  • [50] Threshold certificate-based encryption
    College of Computer and Information Engineering, Hohai University Nanjing, Jiangsu Province, China
    不详
    J. Softw., 2009, 3 (210-217):