Constructing secure proxy cryptosystem

  • Authors:
  • Yuan Zhou;Zhenfu Cao;Zhenchuan Chai

  • Affiliations:
  • Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, P.R. China;Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, P.R. China;Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, P.R. China

  • Venue:
  • CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

Proxy cryptosystem was first proposed by Mambo and Okamoto, for the delegation of the power to decrypt ciphertexts. However, to our knowledge, there is no reasonable mode aimed at this cryptographic notion. In this paper, we first present a practical mode: proxy cryptosystem based on time segmentation. Under this mode, a secure model is proposed and a proxy cryptosystem is constructed. Our construction uses ideas from the HIBE scheme of Gentry and Silverberg, the FSPE scheme of Canetti et al. and the scheme of Fujisaki and Okamoto, and is proven to be secure based on the hardness of bilinear Diffie-Hellman assumption. At last, we give an identity based (ID-based) version of the proxy cryptosystem based on time segmentation.