@inproceedings{f9ca7ffaae4b49ec8c5a478cb69372a4,
title = "Constructing secure proxy cryptosystem",
abstract = "Proxy cryptosystem was first proposed by Mambo and Okamoto, for the delegation of the power to decrypt ciphertexts. However, to our knowledge, there is no reasonable mode aimed at this cryptographic notion. In this paper, we first present a practical mode: proxy cryptosystem based on time segmentation. Under this mode, a secure model is proposed and a proxy cryptosystem is constructed. Our construction uses ideas from the HIBE scheme of Gentry and Silverberg, the FSPE scheme of Canetti et al. and the scheme of Fujisaki and Okamoto, and is proven to be secure based on the hardness of bilinear Diffie-Hellman assumption. At last, we give an identity based (ID-based) version of the proxy cryptosystem based on time segmentation.",
keywords = "Bilinear Diffie-Hellman, ID-based, Proxy cryptosystem",
author = "Yuan Zhou and Zhenfu Cao and Zhenchuan Chai",
year = "2005",
doi = "10.1007/11599548\_13",
language = "英语",
isbn = "3540308555",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
publisher = "Springer Verlag",
pages = "150--161",
booktitle = "Information Security and Cryptology - First SKLOIS Conference, CISC 2005, Proceedings",
address = "德国",
note = "1st SKLOIS Conference on Information Security and Cryptology, CISC 2005 ; Conference date: 15-12-2005 Through 17-12-2005",
}