Presentation 2007-05-18
Security of delegation using proxy-key in ID-based Encryption Scheme
Hirokazu Ougi,
PDF Download Page PDF download Page Link
Abstract(in Japanese) (See Japanese page)
Abstract(in English) Proxy cryptographic scheme allows to transform a ciphertext computed under Alice's public key into one that can be opened by Bob's secret key without seeing underlying plaintext. This scheme will enable a number of useful applications. This paper presents the method to construct proxy-key for delegating decryption right from Alice to Bob using IBE(Identity-based encryption scheme) and security of this primitive. By using this scheme Administator provide Public Key and delegate decryption right between users. The ability to share files amongst users will be improve.
Keyword(in Japanese) (See Japanese page)
Keyword(in English) IBE / Proxy cryptographic scheme / Public Key / decryption right
Paper # ISEC2007-7
Date of Issue

Conference Information
Committee ISEC
Conference Date 2007/5/11(1days)
Place (in Japanese) (See Japanese page)
Place (in English)
Topics (in Japanese) (See Japanese page)
Topics (in English)
Chair
Vice Chair
Secretary
Assistant

Paper Information
Registration To Information Security (ISEC)
Language JPN
Title (in Japanese) (See Japanese page)
Sub Title (in Japanese) (See Japanese page)
Title (in English) Security of delegation using proxy-key in ID-based Encryption Scheme
Sub Title (in English)
Keyword(1) IBE
Keyword(2) Proxy cryptographic scheme
Keyword(3) Public Key
Keyword(4) decryption right
1st Author's Name Hirokazu Ougi
1st Author's Affiliation ()
Date 2007-05-18
Paper # ISEC2007-7
Volume (vol) vol.107
Number (no) 44
Page pp.pp.-
#Pages 8
Date of Issue