Institute of Computing Technology, Chinese Academy IR
| How to construct secure proxy cryptosystem | |
| Zhou, Yuan; Fang, Binxing; Cao, Zhenfu; Yun, Xiaochun; Cheng, Xiaoming | |
| 2007-10-01 | |
| 发表期刊 | INFORMATION SCIENCES
![]() |
| ISSN | 0020-0255 |
| 卷号 | 177期号:19页码:4095-4108 |
| 摘要 | Proxy cryptosystem, first proposed by Mambo and Okamoto [M.Mambo, E. Okamoto, Proxy cryptosystem: delegation of a power to decrypt ciphertexts, IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E80-A/1 (1997) 54-63], allows the original decryptor to delegate his decrypting capability to the proxies. However, until now, no practical proxy cryptosystem modes are proposed. Therefore, in this paper, we present a novel proxy cryptosystem model: proxy cryptosystern based on time segmentation. Under this mode, a security analysis model will be proposed. Furthermore, a proxy cryptosystem scheme is presented as an example. We will show that the proposed scheme is proven security in the proposed security analysis model. Finally, we will give the ID-based version of this construction. (c) 2007 Elsevier Inc. All rights reserved. |
| 关键词 | proxy cryptosystem bilinear Diffie-Hellman ID-based |
| DOI | 10.1016/j.ins.2007.01.024 |
| 收录类别 | SCI |
| 语种 | 英语 |
| WOS研究方向 | Computer Science |
| WOS类目 | Computer Science, Information Systems |
| WOS记录号 | WOS:000248936300011 |
| 出版者 | ELSEVIER SCIENCE INC |
| 引用统计 | |
| 文献类型 | 期刊论文 |
| 条目标识符 | http://119.78.100.204/handle/2XEOYT63/10856 |
| 专题 | 中国科学院计算技术研究所期刊论文_英文 |
| 通讯作者 | Zhou, Yuan |
| 作者单位 | 1.Chinese Acad Sci, Inst Comp Technol, Beijing 100080, Peoples R China 2.Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200030, Peoples R China |
| 推荐引用方式 GB/T 7714 | Zhou, Yuan,Fang, Binxing,Cao, Zhenfu,et al. How to construct secure proxy cryptosystem[J]. INFORMATION SCIENCES,2007,177(19):4095-4108. |
| APA | Zhou, Yuan,Fang, Binxing,Cao, Zhenfu,Yun, Xiaochun,&Cheng, Xiaoming.(2007).How to construct secure proxy cryptosystem.INFORMATION SCIENCES,177(19),4095-4108. |
| MLA | Zhou, Yuan,et al."How to construct secure proxy cryptosystem".INFORMATION SCIENCES 177.19(2007):4095-4108. |
| 条目包含的文件 | 条目无相关文件。 | |||||
除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。
修改评论