Constructing secure proxy cryptosystem

Yuan Zhou*, Zhenfu Cao, Zhenchuan Chai

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

7 Scopus citations

Abstract

Proxy cryptosystem was first proposed by Mambo and Okamoto, for the delegation of the power to decrypt ciphertexts. However, to our knowledge, there is no reasonable mode aimed at this cryptographic notion. In this paper, we first present a practical mode: proxy cryptosystem based on time segmentation. Under this mode, a secure model is proposed and a proxy cryptosystem is constructed. Our construction uses ideas from the HIBE scheme of Gentry and Silverberg, the FSPE scheme of Canetti et al. and the scheme of Fujisaki and Okamoto, and is proven to be secure based on the hardness of bilinear Diffie-Hellman assumption. At last, we give an identity based (ID-based) version of the proxy cryptosystem based on time segmentation.

Original languageEnglish
Title of host publicationInformation Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings
PublisherSpringer Verlag
Pages150-161
Number of pages12
ISBN (Print)3540308555, 9783540308553
DOIs
StatePublished - 2005
Externally publishedYes
Event1st SKLOIS Conference on Information Security and Cryptology, CISC 2005 - Beijing, China
Duration: 15 Dec 200517 Dec 2005

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3822 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference1st SKLOIS Conference on Information Security and Cryptology, CISC 2005
Country/TerritoryChina
CityBeijing
Period15/12/0517/12/05

Keywords

  • Bilinear Diffie-Hellman
  • ID-based
  • Proxy cryptosystem

Fingerprint

Dive into the research topics of 'Constructing secure proxy cryptosystem'. Together they form a unique fingerprint.

Cite this