A Subject-Delegated Decryption Scheme with "Tightly" Limited Authority

نویسندگان

  • Lihua Wang
  • Takeshi Okamoto
  • Masahiro Mambo
  • Eiji Okamoto
چکیده

In this paper, we present a new proxy cryptosystem named subject-delegated decryption scheme, in which the original decryptor delegates decryption authority to multiple proxies according to different subjects. The advantage of our scheme is that the proxy authorities are tightly limited (“Tightly” Limited Authority). This means that the proxy authority can be temporarily aborted even if the validity period of the proxy key does not expire. Consequently, our protocol is more practical than the existential protocols because the secrecy of the original decryptor can be protected efficiently from his proxy, especially when the proxy becomes corrupted. Our scheme is efficient because the encryption method in our scheme is based on a hybrid of symmetric key and public key cryptographic techniques. We give the provable security using a variant decisional Bilinear Diffie-Hellman (BDH) assumption named the Decisional β-BDH Assumption.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses

SUMMARY In this paper authorization-limited transformation-free proxy cryptosystems (AL-TFP systems) are studied. It is a modification of the original proxy cryptosystem introduced by Mambo et al. [8] in which a ciphertext transformation by the original decryptor is necessary, and also a modification of the delegated decryption system proposed by Mu et al. [10]. In both systems proposed in [8] ...

متن کامل

Outsourcing Decryption of Multi-Authority ABE Ciphertexts

The notion of multi-authority attribute based encryption was introduced by Chase in TCC 2007. In this paper, we improve Chase’s scheme to allow encryptors to determine how many attributes are required for each ciphertext from related attribute authorities. The proposed scheme can be seen as a multi-trapdoor construction. Furthermore, we apply the LMSSS to outsource the decryption of multi-autho...

متن کامل

Quantum Homomorphic Encryption for Polynomial-Sized Circuits

We present a new scheme for quantum homomorphic encryption which is compact and allows for efficient evaluation of arbitrary polynomial-sized quantum circuits. Building on the framework of Broadbent and Jeffery [BJ15] and recent results in the area of instantaneous non-local quantum computation [Spe15], we show how to construct quantum gadgets that allow perfect correction of the errors which o...

متن کامل

Attribute-based Encryption with Decryption and Revocation Outsource in Cloud Environment

In order to improve the efficiency of attribute based encryption, according to the work of Li etal. [17] , a new technique is adopted to implement the revocation of attribute-based encryption. Based on the work of Green etal.[16], a ciphertext attribute based encryption (CP-ABE) scheme with outsourced revocation and decryption simultaneously is proposed. After outsourcing complex computation in...

متن کامل

Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys

At Crypto’07, Goyal introduced the concept of Accountable Authority Identity-Based Encryption as a convenient tool to reduce the amount of trust in authorities in Identity-Based Encryption. In this model, if the Private Key Generator (PKG) maliciously re-distributes users’ decryption keys, it runs the risk of being caught and prosecuted. Goyal proposed two constructions: the first one is effici...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2006  شماره 

صفحات  -

تاریخ انتشار 2006