密码系统
代表
计算机科学
代理(统计)
混合密码体制
Goldwasser–Micali密码系统
理论计算机科学
密码学
计算机安全
可证明的安全性
代理重新加密
加密
公钥密码术
程序设计语言
机器学习
作者
Yuan Zhou,Binxing Fang,Zhenfu Cao,Xiaochun Yun,Xiaoming Cheng
标识
DOI:10.1016/j.ins.2007.01.024
摘要
Proxy cryptosystem, first proposed by Mambo and Okamoto [M.Mambo, E. Okamoto, Proxy cryptosystem: delegation of a power to decrypt ciphertexts, IEICE Trans. Fundam. Electron. Commun. Comput. Sci. E80-A/1 (1997) 54–63], allows the original decryptor to delegate his decrypting capability to the proxies. However, until now, no practical proxy cryptosystem modes are proposed. Therefore, in this paper, we present a novel proxy cryptosystem model: proxy cryptosystem based on time segmentation. Under this mode, a security analysis model will be proposed. Furthermore, a proxy cryptosystem scheme is presented as an example. We will show that the proposed scheme is proven security in the proposed security analysis model. Finally, we will give the ID-based version of this construction.
科研通智能强力驱动
Strongly Powered by AbleSci AI