Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Identity-Based Encryption from the Weil Pairing
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Transformation-free proxy cryptosystems and their applications to electronic commerce
InfoSecu '04 Proceedings of the 3rd international conference on Information security
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
How to construct secure proxy cryptosystem
Information Sciences: an International Journal
Improved certificate-based encryption in the standard model
Journal of Systems and Software
Certificate-based encryption and the certificate revocation problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Proxy re-encryption with keyword search
Information Sciences: an International Journal
A certificate-based proxy cryptosystem with revocable proxy decryption power
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Chosen-ciphertext secure bidirectional proxy re-encryption schemes without pairings
Information Sciences: an International Journal
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Constructing secure proxy cryptosystem
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Efficient identity-based encryption without random oracles
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
HEAD: hybrid encryption with delegated decryption capability
INDOCRYPT'04 Proceedings of the 5th international conference on Cryptology in India
Hi-index | 0.07 |
We present the concept of a certificate-based proxy decryption (CBPd) system with revocability, which has the following properties: (1) key-escrow freeness; (2) implicit certification; (3) revocability without public key change; and (4) fine-grained delegation. A concrete CBPd scheme is also proposed. The scheme is semantically secure against adaptive chosen plaintext attack (IND-CBPd-Rev-CPA) under the decisional bilinear Diffie-Hellman assumption in the standard model. We also give an enhanced scheme that is secure against adaptive chosen ciphertext attacks (IND-CBPd-Rev-CCA) in the standard model.