MISC

2006年1月

Authorization-limited transformation-free proxy cryptosystems and their security analyses

IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES
  • LH Wang
  • ,
  • ZF Cao
  • ,
  • T Okamoto
  • ,
  • Y Miao
  • ,
  • E Okamoto

E89A
1
開始ページ
106
終了ページ
114
記述言語
英語
掲載種別
DOI
10.1093/ietfec/e89-a.1.106
出版者・発行元
IEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG

In this paper authorization-limited transformation-free proxy cryptosystems (AL-TFP systems) are studied. It is a modification of the original proxy cryptosystem introduced by Mambo et al: [8] in which a ciphertext transformation by the original decryptor is necessary, and also a modification of the delegated decryption system proposed by Mu et al. [10]. In both systems proposed in [8] and [10], the original decryptors have to trust their proxies completely. The AL-TFP system allows the proxy decryptor to do decryption directly without any ciphertext transformation from the original decryptor, so that it can release the original decryptor more efficiently from a large amount of decrypting operations. Moreover, the original decryptor's privacy can be protected efficiently because the authority of proxy decryptor is limited to his duty and valid period. An active identity-based and a directory-based AL-TFP systems from pairings are proposed. Furthermore, an application of directory-based AL-TFP system to electronic commerce is also described. The securities of our schemes introduced are based on the BDH assumption.

リンク情報
DOI
https://doi.org/10.1093/ietfec/e89-a.1.106
Web of Science
https://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcAuth=JSTA_CEL&SrcApp=J_Gate_JST&DestLinkType=FullRecord&KeyUT=WOS:000234948500014&DestApp=WOS_CPL
ID情報
  • DOI : 10.1093/ietfec/e89-a.1.106
  • ISSN : 0916-8508
  • eISSN : 1745-1337
  • Web of Science ID : WOS:000234948500014

エクスポート
BibTeX RIS