Movatterモバイル変換


[0]ホーム

URL:


Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses

Lihua WANG,Zhenfu CAO,Takeshi OKAMOTO,Ying MIAO,Eiji OKAMOTO

  • Full Text Views

    0

Summary :

In this paperauthorization-limited transformation-free proxy cryptosystems (AL-TFP systems) are studied. It is a modification of the original proxy cryptosystem introduced by Mambo et al.[8] in which a ciphertext transformation by the original decryptor is necessary, and also a modification of the delegated decryption system proposed by Mu et al.[10]. In both systems proposed in [8] and [10], the original decryptors have to trust their proxies completely. The AL-TFP system allows the proxy decryptor to do decryption directly without any ciphertext transformation from the original decryptor, so that it can release the original decryptor more efficiently from a large amount of decrypting operations. Moreover, the original decryptor's privacy can be protected efficiently because the authority of proxy decryptor is limited to his duty and valid period. An active identity-based and a directory-based AL-TFP systems from pairings are proposed. Furthermore, an application of directory-based AL-TFP system to electronic commerce is also described. The securities of our schemes introduced are based on the BDH assumption.

Publication
IEICE TRANSACTIONS on FundamentalsVol.E89-A No.1 pp.106-114
Publication Date
2006/01/01
Publicized
Online ISSN
1745-1337
DOI
10.1093/ietfec/e89-a.1.106
Type of Manuscript
Special Section PAPER (Special Section on Cryptography and Information Security)
Category
Protocol

Authors

Keyword

Latest Issue

Contents

Copyrights notice of machine-translated contents

The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. SeeIEICE Provisions on Copyright for details.

Email Document

Cite this

Copy

Lihua WANG, Zhenfu CAO, Takeshi OKAMOTO, Ying MIAO, Eiji OKAMOTO, "Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses" in IEICE TRANSACTIONS on Fundamentals, vol. E89-A, no. 1, pp. 106-114, January 2006, doi:10.1093/ietfec/e89-a.1.106.
Abstract:In this paperauthorization-limited transformation-free proxy cryptosystems (AL-TFP systems) are studied. It is a modification of the original proxy cryptosystem introduced by Mambo et al.[8] in which a ciphertext transformation by the original decryptor is necessary, and also a modification of the delegated decryption system proposed by Mu et al.[10]. In both systems proposed in [8] and [10], the original decryptors have to trust their proxies completely. The AL-TFP system allows the proxy decryptor to do decryption directly without any ciphertext transformation from the original decryptor, so that it can release the original decryptor more efficiently from a large amount of decrypting operations. Moreover, the original decryptor's privacy can be protected efficiently because the authority of proxy decryptor is limited to his duty and valid period. An active identity-based and a directory-based AL-TFP systems from pairings are proposed. Furthermore, an application of directory-based AL-TFP system to electronic commerce is also described. The securities of our schemes introduced are based on the BDH assumption.
URL: https://globals.ieice.org/en_transactions/fundamentals/10.1093/ietfec/e89-a.1.106/_p

Copy

@ARTICLE{e89-a_1_106,
author={Lihua WANG, Zhenfu CAO, Takeshi OKAMOTO, Ying MIAO, Eiji OKAMOTO, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses},
year={2006},
volume={E89-A},
number={1},
pages={106-114},
abstract={In this paperauthorization-limited transformation-free proxy cryptosystems (AL-TFP systems) are studied. It is a modification of the original proxy cryptosystem introduced by Mambo et al.[8] in which a ciphertext transformation by the original decryptor is necessary, and also a modification of the delegated decryption system proposed by Mu et al.[10]. In both systems proposed in [8] and [10], the original decryptors have to trust their proxies completely. The AL-TFP system allows the proxy decryptor to do decryption directly without any ciphertext transformation from the original decryptor, so that it can release the original decryptor more efficiently from a large amount of decrypting operations. Moreover, the original decryptor's privacy can be protected efficiently because the authority of proxy decryptor is limited to his duty and valid period. An active identity-based and a directory-based AL-TFP systems from pairings are proposed. Furthermore, an application of directory-based AL-TFP system to electronic commerce is also described. The securities of our schemes introduced are based on the BDH assumption.},
keywords={},
doi={10.1093/ietfec/e89-a.1.106},
ISSN={1745-1337},
month={January},}

Copy

TY - JOUR
TI - Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 106
EP - 114
AU - Lihua WANG
AU - Zhenfu CAO
AU - Takeshi OKAMOTO
AU - Ying MIAO
AU - Eiji OKAMOTO
PY - 2006
DO -10.1093/ietfec/e89-a.1.106
JO - IEICE TRANSACTIONS on Fundamentals
SN -1745-1337
VL - E89-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2006
AB -In this paperauthorization-limited transformation-free proxy cryptosystems (AL-TFP systems) are studied. It is a modification of the original proxy cryptosystem introduced by Mambo et al.[8] in which a ciphertext transformation by the original decryptor is necessary, and also a modification of the delegated decryption system proposed by Mu et al.[10]. In both systems proposed in [8] and [10], the original decryptors have to trust their proxies completely. The AL-TFP system allows the proxy decryptor to do decryption directly without any ciphertext transformation from the original decryptor, so that it can release the original decryptor more efficiently from a large amount of decrypting operations. Moreover, the original decryptor's privacy can be protected efficiently because the authority of proxy decryptor is limited to his duty and valid period. An active identity-based and a directory-based AL-TFP systems from pairings are proposed. Furthermore, an application of directory-based AL-TFP system to electronic commerce is also described. The securities of our schemes introduced are based on the BDH assumption.
ER -

FlyerIEICE has prepared a flyer regarding multilingual services. Please use the one in your native language.

IEICE DIGITAL LIBRARY

Select the flag iconEnglishEnglish
Sign In[Member]
Sign In[Non-Member]

Sign In[Non-Member]

Create Account now.

Create Account

Sign In[Member]

Create Account now.

Create Account

Links

Call for Papers
Call for Papers

Special Section

Submit to IEICE Trans.
Submit to IEICE Trans.

Information for Authors

Transactions NEWS
Awarded Papers, etc

 

Popular articles
Popular articles

Top 10 Downloads


[8]ページ先頭

©2009-2025 Movatter.jp