The search functionality is under construction.

IEICE TRANSACTIONS on Fundamentals

Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses

Lihua WANG, Zhenfu CAO, Takeshi OKAMOTO, Ying MIAO, Eiji OKAMOTO

  • Full Text Views

    0

  • Cite this

Summary :

In this paper authorization-limited transformation-free proxy cryptosystems (AL-TFP systems) are studied. It is a modification of the original proxy cryptosystem introduced by Mambo et al.[8] in which a ciphertext transformation by the original decryptor is necessary, and also a modification of the delegated decryption system proposed by Mu et al.[10]. In both systems proposed in [8] and [10], the original decryptors have to trust their proxies completely. The AL-TFP system allows the proxy decryptor to do decryption directly without any ciphertext transformation from the original decryptor, so that it can release the original decryptor more efficiently from a large amount of decrypting operations. Moreover, the original decryptor's privacy can be protected efficiently because the authority of proxy decryptor is limited to his duty and valid period. An active identity-based and a directory-based AL-TFP systems from pairings are proposed. Furthermore, an application of directory-based AL-TFP system to electronic commerce is also described. The securities of our schemes introduced are based on the BDH assumption.

Publication
IEICE TRANSACTIONS on Fundamentals Vol.E89-A No.1 pp.106-114
Publication Date
2006/01/01
Publicized
Online ISSN
1745-1337
DOI
10.1093/ietfec/e89-a.1.106
Type of Manuscript
Special Section PAPER (Special Section on Cryptography and Information Security)
Category
Protocol

Authors

Keyword