Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Efficient Algorithms for Pairing-Based Cryptosystems
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
A certificate-based proxy cryptosystem with revocable proxy decryption power
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
A novel commutative blinding identity based encryption scheme
FPS'11 Proceedings of the 4th Canada-France MITACS conference on Foundations and Practice of Security
Certificate-based proxy decryption systems with revocability in the standard model
Information Sciences: an International Journal
Hi-index | 0.00 |
We consider the problem of adding the functionality of delegated decryption on top of usual encryption schemes. An appropriate security model is described for such schemes. Our main contribution is to present a practical and efficient public key encryption scheme HEAD, which achieves the functionality of delegated decryption. The new scheme is obtained by combining bilinear map based techniques with Kurosawa-Matsuo modification of DHIES. The scheme HEAD is proved to be secure based on appropriate security assumptions on the components.