Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses(Protocol, <Special Section>Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
In this paper authorization-limited transformation-free proxy cryptosystems (AL-TFP systems) are studied. It is a modification of the original proxy cryptosystem introduced by Mambo et al. [8] in which a ciphertext transformation by the original decryptor is necessary, and also a modification of the delegated decryption system proposed by Mu et al. [10]. In both systems proposed in [8] and [10], the original decryptors have to trust their proxies completely. The AL-TFP system allows the proxy decryptor to do decryption directly without any ciphertext transformation from the original decryptor, so that it can release the original decryptor more efficiently from a large amount of decrypting operations. Moreover, the original decryptor's privacy can be protected efficiently because the authority of proxy decryptor is limited to his duty and valid period. An active identity-based and a directory-based AL-TFP systems from pairings are proposed. Furthermore, an application of directory-based AL-TFP system to electronic commerce is also described. The securities of our schemes introduced are based on the BDH assumption.
- 社団法人電子情報通信学会の論文
- 2006-01-01
著者
-
Okamoto Eiji
Graduate School Of Systems And Information Engineering University Of Tsukuba
-
MIAO Ying
Graduate School of Systems and Information Engineering, University of Tsukuba
-
OKAMOTO Takeshi
Graduate School of Systems and Information Engineering, University of Tsukuba
-
WANG Lihua
Graduate School of Systems and Information Engineering, University of Tsukuba
-
CAO Zhenfu
Department of Computer Science, Shanghai Jiao Tong University
-
Cao Zhenfu
Department Of Computer Science Shanghai Jiao Tong University
-
Wang Lihua
University Of Tsukuba:(present Office)security Fundamentals Group Information Security Research Cent
-
Okamoto Eiji
Univ. Tsukuba Tsukuba‐shi Jpn
-
Miao Ying
Graduate School Of Systems And Information Engineering University Of Tsukuba
-
Okamoto Takeshi
Tsukuba Univ. Technol. Tsukuba‐shi Jpn
-
Okamoto Takeshi
Graduate School Of Medical Professions Kawasaki University Of Medical Welfare
-
Okamoto Eiji
Graduate School Of Systems And Information Engineering Univ. Of Tsukuba
-
Okamoto Takeshi
Graduate School of Materials Science, Nara Institute of Science and Technology, Takayama 8916-5, Ikoma, Nara 630-0192, Japan
関連論文
- Sender Authenticated Key Agreements without Random Oracles
- An ID-SP-M4M Scheme and Its Security Analysis(Signatures,Cryptography and Information Security)
- Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses(Protocol, Cryptography and Information Security)
- A Share-Correctable Protocol for the Shamir Threshod Scheme and Its Application to Participant Enrollment (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
- How to Verify the Threshold t of Shamir's (t,n)-Threshold Scheme (特集 多様な社会的責任を担うコンピュータセキュリティ技術)
- A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment
- How to Verify the Threshold t of Shamirs (t, n)-Threshold Scheme
- EFFECTS OF SUPINE FLOATING ON RECTAL TEMPERATURE AND CARDIAC AUTONOMIC NERVOUS SYSTEM ACTIVITY AFTER HIGH AND MODERATE INTENSITY EXERCISE WITH A CYCLE ERGOMETER(Proceedings of The 8^ Asian Federation of Sports Medicine Congress 2005 Tokyo)
- Sender Authenticated Key Agreements without Random Oracles
- Fermat's type equations in the set of 2 × 2 integral matrices
- Effect of Nitrogen on Electrical and Physical Properties of Polyatomic Layer Chemical Vapor Deposition HfSi_xO_y Gate Dielectrics
- Some Efficient Algorithms for the Final Exponentiation of ηT Pairing
- Universal ηT pairing algorithm over arbitrary extension degree (ワイドバンドシステム)
- Universal ηT pairing algorithm over arbitrary extension degree (情報セキュリティ)
- Universal ηT pairing algorithm over arbitrary extension degree (情報理論)
- Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks (特集:ユビキタス社会を支えるコンピュータセキュリティ技術)
- Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities
- Effect of Nitrogen on Electrical and Physical Properties of Polyatomic Layer Chemical Vapor Deposition HfSixOy Gate Dielectrics
- Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks
- A Share-Correctable Protocol for the Shamir Threshold Scheme and Its Application to Participant Enrollment
- Anonymous On-Demand Position-based Routing in Mobile Ad-hoc Networks