Advertisement

A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power

  • Lihua Wang
  • Jun Shao
  • Zhenfu Cao
  • Masahiro Mambo
  • Akihiro Yamamura
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4859)

Abstract

We present a proxy cryptosystem based on a certificate-based encryption scheme. The proposed scheme inherits the merits of certificate-based encryption systems: no-key-escrow and implicit certification. In addition, the proposed scheme allows the proxy’s decryption power to be revoked even during the valid period of the proxy key without changing the original decryptor’s public information. Few proxy schemes have this property, and ours is more efficient than the existing ones. We show that our proposal is IND-CBPd-Rev-CCA secure under the bilinear Diffie-Hellman assumption in the random oracle model.

Keywords

proxy cryptosystem pairing certificate-based encryption (CBE) 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Boneh, D., Boyen, X.: Secure identity based encryption without random oracles. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 443–459. Springer, Heidelberg (2004)Google Scholar
  2. 2.
    Boneh, D., Franklin, M.: Identity-based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  3. 3.
    Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRPYT 2003. LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  4. 4.
    Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  5. 5.
    Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537–554. Springer, Heidelberg (1999)Google Scholar
  6. 6.
    Gentry, C.: Certificate-based encryption and the certificate revocation problem. In: Biham, E. (ed.) EUROCRPYT 2003. LNCS, vol. 2656, pp. 272–293. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  7. 7.
    Mambo, M., Okamoto, E.: Proxy cryptosystem: Delegation of the power to decrypt ciphertexts. IEICE Trans. Fundamentals E80-A(1), 54–63 (1997)Google Scholar
  8. 8.
    Mu, Y., Varadharajan, V., Nguyen, K.Q.: Delegation decryption. In: Walker, M. (ed.) IMA - Crypto & Coding 1999. LNCS, vol. 1746, pp. 258–269. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  9. 9.
    Sakai, R., Ohgishi, K., Kasahara, M.: Cryptosystems based on pairing, SCIS2000-C20 (2000)Google Scholar
  10. 10.
    Sarkar, P.: HEAD: hybrid encryption with delegated decryption capbility. In: Canteaut, A., Viswanathan, K. (eds.) INDOCRYPT 2004. LNCS, vol. 3348, pp. 230–244. Springer, Heidelberg (2004)Google Scholar
  11. 11.
    Wang, L., Cao, Z., Okamoto, E., Miao, Y., Okamoto, T.: Transformation-free proxy cryptosystems and their applications to electronic commerce. In: Proceeding of International Conference on Information Security (InfoSecu 2004), pp. 92–98. ACM Press, New York (2004)CrossRefGoogle Scholar
  12. 12.
    Wang, L., Cao, Z., Okamoto, T., Miao, Y., Okamoto, E.: Authorization-limited transformation-free proxy cryptosystems and their security analyses. IEICE Trans. Fundamentals E89-A(1), 106–114 (2006)CrossRefGoogle Scholar
  13. 13.
    Waters, B.: Efficient identity-based encryption without random oracles. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 114–127. Springer, Heidelberg (2005)Google Scholar
  14. 14.
    Zhou, Y., Cao, Z., Chai, Z.: Constructing Secure Proxy Cryptosystem. In: Feng, D., Lin, D., Yung, M. (eds.) CISC 2005. LNCS, vol. 3822, pp. 150–161. Springer, Heidelberg (2005)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Lihua Wang
    • 1
  • Jun Shao
    • 2
  • Zhenfu Cao
    • 2
  • Masahiro Mambo
    • 3
  • Akihiro Yamamura
    • 1
  1. 1.Information Security Research Center, National Institute of Information and Communications Technology, Tokyo 184-8795Japan
  2. 2.Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai 200240P.R. China
  3. 3.Graduate School of Systems and Information Engineering, University of Tsukuba, Tsukuba 305-8573Japan

Personalised recommendations