Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses*A preliminary version was presented at InfoSecu'04 [13].

  • Authors:
  • Lihua Wang;Zhenfu Cao;Takeshi Okamoto;Ying Miao;Eiji Okamoto

  • Affiliations:
  • The authors are with the Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba-shi, 305-8573 Japan. E-mail: wlh@cipher.risk.tsukuba.ac.jp, E-mail: ken@risk.tsukuba ...;The author is with the Department of Computer Science, Shanghai Jiao Tong University, Shanghai 200030, P.R. China. E-mail: zfcao@cs.sjtu.edu.cn;The authors are with the Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba-shi, 305-8573 Japan. E-mail: wlh@cipher.risk.tsukuba.ac.jp, E-mail: ken@risk.tsukuba ...;The authors are with the Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba-shi, 305-8573 Japan. E-mail: wlh@cipher.risk.tsukuba.ac.jp, E-mail: ken@risk.tsukuba ...;The authors are with the Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba-shi, 305-8573 Japan. E-mail: wlh@cipher.risk.tsukuba.ac.jp, E-mail: ken@risk.tsukuba ...

  • Venue:
  • IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper authorization-limited transformation-free proxy cryptosystems (AL-TFP systems) are studied. It is a modification of the original proxy cryptosystem introduced by Mambo et al. [8] in which a ciphertext transformation by the original decryptor is necessary, and also a modification of the delegated decryption system proposed by Mu et al. [10]. In both systems proposed in [8] and [10], the original decryptors have to trust their proxies completely. The AL-TFP system allows the proxy decryptor to do decryption directly without any ciphertext transformation from the original decryptor, so that it can release the original decryptor more efficiently from a large amount of decrypting operations. Moreover, the original decryptor's privacy can be protected efficiently because the authority of proxy decryptor is limited to his duty and valid period. An active identity-based and a directory-based AL-TFP systems from pairings are proposed. Furthermore, an application of directory-based AL-TFP system to electronic commerce is also described. The securities of our schemes introduced are based on the BDH assumption.