Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Proxy signatures for delegating signing operation
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Efficient Identity Based Signature Schemes Based on Pairings
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
Applications of Multiple Trust Authorities in Pairing Based Cryptosystems
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Elliptic Curves: Number Theory and Cryptography
Elliptic Curves: Number Theory and Cryptography
How to construct secure proxy cryptosystem
Information Sciences: an International Journal
A certificate-based proxy cryptosystem with revocable proxy decryption power
INDOCRYPT'07 Proceedings of the cryptology 8th international conference on Progress in cryptology
Constructing secure proxy cryptosystem
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Certificate-based proxy decryption systems with revocability in the standard model
Information Sciences: an International Journal
Hi-index | 0.00 |
In this paper transformation-free proxy cryptosystems (TFP systems) are studied. The TFP system is a modification of the proxy cryptosystem introduced by Mambo and Okamoto [6] in which a ciphertext transformation by the original decryptor is necessary. The TFP system allows proxy decryptor to do decryption without any ciphertext transformation, so that it can release the original decryptor more efficiently from a large amount of decrypting operations. An active identity-based and a directory-based TFP systems based on pairings are proposed. Furthermore, two applications of directory-based TFP system in electronic commerce are also investigated.