A certificate-based proxy cryptosystem with revocable proxy decryption power

  • Lihua Wang*
  • , Jun Shao
  • , Zhenfu Cao
  • , Masahiro Mambo
  • , Akihiro Yamamura
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

27 Scopus citations

Abstract

We present a proxy cryptosystem based on a certificate-based encryption scheme. The proposed scheme inherits the merits of certificate-based encryption systems: no-key-escrow and implicit certification. In addition, the proposed scheme allows the proxy's decryption power to be revoked even during the valid period of the proxy key without changing the original decryptor's public information. Few proxy schemes have this property, and ours is more efficient than the existing ones. We show that our proposal is IND-CBPd-Rev-CCA secure under the bilinear Diffie-Hellman assumption in the random oracle model.

Original languageEnglish
Title of host publicationProgress in Cryptology - INDOCRYPT 2007 - 8th International Conference on Cryptology in India, Proceedings
PublisherSpringer Verlag
Pages297-311
Number of pages15
ISBN (Print)9783540770251
DOIs
StatePublished - 2007
Externally publishedYes
Event8th Annual International Conference on Cryptolology in India, INDOCRYPT 2007 - Chennai, India
Duration: 9 Dec 200713 Dec 2007

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume4859 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th Annual International Conference on Cryptolology in India, INDOCRYPT 2007
Country/TerritoryIndia
CityChennai
Period9/12/0713/12/07

Keywords

  • Certificate-based encryption (CBE)
  • Pairing
  • Proxy cryptosystem

Fingerprint

Dive into the research topics of 'A certificate-based proxy cryptosystem with revocable proxy decryption power'. Together they form a unique fingerprint.

Cite this