Presentation | 2007-05-18 Security of delegation using proxy-key in ID-based Encryption Scheme Hirokazu Ougi, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | Proxy cryptographic scheme allows to transform a ciphertext computed under Alice's public key into one that can be opened by Bob's secret key without seeing underlying plaintext. This scheme will enable a number of useful applications. This paper presents the method to construct proxy-key for delegating decryption right from Alice to Bob using IBE(Identity-based encryption scheme) and security of this primitive. By using this scheme Administator provide Public Key and delegate decryption right between users. The ability to share files amongst users will be improve. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | IBE / Proxy cryptographic scheme / Public Key / decryption right |
Paper # | ISEC2007-7 |
Date of Issue |
Conference Information | |
Committee | ISEC |
---|---|
Conference Date | 2007/5/11(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information Security (ISEC) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Security of delegation using proxy-key in ID-based Encryption Scheme |
Sub Title (in English) | |
Keyword(1) | IBE |
Keyword(2) | Proxy cryptographic scheme |
Keyword(3) | Public Key |
Keyword(4) | decryption right |
1st Author's Name | Hirokazu Ougi |
1st Author's Affiliation | () |
Date | 2007-05-18 |
Paper # | ISEC2007-7 |
Volume (vol) | vol.107 |
Number (no) | 44 |
Page | pp.pp.- |
#Pages | 8 |
Date of Issue |