Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
In this paper a new type of public-key cryptosystem, proxy cryptosystem, is studied. The proxy cryptosystem allows an original decryptor to transform its ciphertext to a ciphertext for a designated decryptor, proxy decryptor. Once the ciphertext transformation is executed, the proxy decryptor can compute a plaintext in place of the original decryptor. Such a cryptosystem is very useful when an entity has to deal with large amount of decrypting operation. The entity can actually speed-up the decrypting operation by authorizing multiple proxy decryptors. Concrete proxy cryptosystems are constructed for the ElGamal cryptosystem and the RSA cryptosystem. A straightforward construction of the proxy cryptosystem is given as follows. The original decryptor decrypts its ciphertext and re-encrypts an obtained plaintext under a designated proxy decryptor's public key. Then the designated proxy decryptor can read the plaintext. Our constructions are more efficient than such consecutive execution of decryption and re-encryption. Especially, the computational work done by the original decryptor is reduced in the proxy cryptosystems.
- 社団法人電子情報通信学会の論文
- 1997-01-25
著者
-
OKAMOTO Eiji
School of Engineering, Hokkaido Tokai University
-
Mambo M
Japan Advanced Inst. Sci. And Technol. Ishikawa‐ken Jpn
-
Mambo Masahiro
School Of Inform. Sci. Japan Advanced Institute Of Science And Technology
関連論文
- Numerical estimation of heat distribution from the implantable battery system of an undulation pump LVAD
- Proposal of an Automatic Signature Scheme Using a Compiler (Special Section on Cryptography and Information Security)
- Reliability Functions for Concatenated Codes Employing Modular Codes with Maximum Likelihood Decoding
- Permutation Cipher Scheme Using Polynomials over a Field
- A Secure Broadcast Communication Method with Short Messages (Special Section on Information Theory and Its Applications)
- Proxy Signatures: Delegation of the Power to Sign Messages (Special Section on Information Theory and Its Applications)
- Constructing Identity-Based Key Distribution Systems over Elliptic Curves (Special Section on Information Theory and Its Applications)
- The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem(Public Key Cryptography)(Cryptography and Information Security)
- Complexity Analysis of the Cryptographic Primitive Problems through Square-Root Exponent(Discrete Mathematics and Its Applications)
- Feasibility of a remote monitoring system for patients with an implantable left ventricular assist device using Personal Handy-Phone System telecommunication technology
- On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks : Special Section on Cryptography and Information Security
- On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks
- Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts (Special Section on Cryptography and Information Security)
- Factoring Hard Integers on a Parallel Machine (Special Section on Discrete Mathematics and Its Applications)
- Faster Factoring of Integers of a Special Form (Special Section on Discrete Mathematics and Its Applications)
- Algebraic Properties of Permutation Polynomials (Special Section on Discrete Mathematics and Its Applications)