A certificate-based proxy cryptosystem with revocable proxy decryption power

  • Authors:
  • Lihua Wang;Jun Shao;Zhenfu Cao;Masahiro Mambo;Akihiro Yamamura

  • Affiliations:
  • Information Security Research Center, National Institute of Information and Communications Technology, Tokyo, Japan;Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, P.R. China;Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, P.R. China;Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba, Japan;Information Security Research Center, National Institute of Information and Communications Technology, Tokyo, Japan

  • Venue:
  • INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

We present a proxy cryptosystem based on a certificate-based encryption scheme. The proposed scheme inherits the merits of certificate-based encryption systems: no-key-escrow and implicit certification. In addition, the proposed scheme allows the proxy's decryption power to be revoked even during the valid period of the proxy key without changing the original decryptor's public information. Few proxy schemes have this property, and ours is more efficient than the existing ones. We show that our proposal is IND-CBPd-Rev-CCA secure under the bilinear Diffie-Hellman assumption in the random oracle model.