Delegated decryption

Yi Mu, Vijay Varadharajan, Khan Quac Nguyen

Research output: Chapter in Book/Report/Conference proceedingChapterpeer-review

20 Citations (Scopus)

Abstract

This paper proposes a new public key based system that enables us to have a single public key with one or more decryption keys and a unique signing key. One straightforward application for our system is in delegated or proxy based decryption. The proxy based decryption requires that the decryption authority can be delegated to another party (proxy) without revealing the signing key information. This suggests that the proxy who has the legitimate right for decryption cannot sign on behalf of the public key owner; only the legitimate signer can be the owner of the public key.

Original languageEnglish
Title of host publicationCryptography and Coding
Subtitle of host publication7th IMA International Conference Cirencester, UK, December 20–22, 1999 Proceedings
EditorsMichael Walker
Place of PublicationBerlin
PublisherSpringer, Springer Nature
Pages258-269
Number of pages12
ISBN (Electronic)9783540466659
ISBN (Print)9783540668879
DOIs
Publication statusPublished - 1999
Externally publishedYes
Event7th IMA International Conference on Cryptography and Coding, 1999 - Cirencester, United Kingdom
Duration: 20 Dec 199922 Dec 1999

Publication series

NameLecture Notes in Computer Science
PublisherSpringer Berlin Heidelberg
Volume1746
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other7th IMA International Conference on Cryptography and Coding, 1999
Country/TerritoryUnited Kingdom
CityCirencester
Period20/12/9922/12/99

Fingerprint

Dive into the research topics of 'Delegated decryption'. Together they form a unique fingerprint.

Cite this