How to construct secure proxy cryptosystem

  • Authors:
  • Yuan Zhou;Binxing Fang;Zhenfu Cao;Xiaochun Yun;Xiaoming Cheng

  • Affiliations:
  • Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, PR China and National Computer Network Emergency Response Technical Team/Coordination Center of China, PR China;Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, PR China and National Computer Network Emergency Response Technical Team/Coordination Center of China, PR China;Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200030, PR China;Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, PR China and National Computer Network Emergency Response Technical Team/Coordination Center of China, PR China;National Computer Network Emergency Response Technical Team/Coordination Center of China, PR China

  • Venue:
  • Information Sciences: an International Journal
  • Year:
  • 2007

Quantified Score

Hi-index 0.07

Visualization

Abstract

Proxy cryptosystem, first proposed by Mambo and Okamoto [M.Mambo, E. Okamoto, Proxy cryptosystem: delegation of a power to decrypt ciphertexts, IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E80-A/1 (1997) 54-63], allows the original decryptor to delegate his decrypting capability to the proxies. However, until now, no practical proxy cryptosystem modes are proposed. Therefore, in this paper, we present a novel proxy cryptosystem model: proxy cryptosystem based on time segmentation. Under this mode, a security analysis model will be proposed. Furthermore, a proxy cryptosystem scheme is presented as an example. We will show that the proposed scheme is proven security in the proposed security analysis model. Finally, we will give the ID-based version of this construction.