How to construct secure proxy cryptosystem

Yuan Zhou, Binxing Fang, Zhenfu Cao, Xiaochun Yun, Xiaoming Cheng

Research output: Contribution to journalArticlepeer-review

10 Scopus citations

Abstract

Proxy cryptosystem, first proposed by Mambo and Okamoto [M.Mambo, E. Okamoto, Proxy cryptosystem: delegation of a power to decrypt ciphertexts, IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E80-A/1 (1997) 54-63], allows the original decryptor to delegate his decrypting capability to the proxies. However, until now, no practical proxy cryptosystem modes are proposed. Therefore, in this paper, we present a novel proxy cryptosystem model: proxy cryptosystem based on time segmentation. Under this mode, a security analysis model will be proposed. Furthermore, a proxy cryptosystem scheme is presented as an example. We will show that the proposed scheme is proven security in the proposed security analysis model. Finally, we will give the ID-based version of this construction.

Original languageEnglish
Pages (from-to)4095-4108
Number of pages14
JournalInformation Sciences
Volume177
Issue number19
DOIs
StatePublished - 1 Oct 2007
Externally publishedYes

Keywords

  • Bilinear Diffie-Hellman
  • ID-based
  • Proxy cryptosystem

Fingerprint

Dive into the research topics of 'How to construct secure proxy cryptosystem'. Together they form a unique fingerprint.

Cite this