首页 | 官方网站   微博 | 高级检索  
     


ID-based threshold decryption secure against adaptive chosen-ciphertext attack
Authors:Yu Long [Author Vitae]  Kefei Chen [Author Vitae]  Shengli Liu [Author Vitae]
Affiliation:a Department of Computer Science and Engineering, Shanghai Jiao Tong University, P.O. Box A0403391, 800 Dongchuan Road, Shanghai 200240, PR China
b National Laboratory of Modern Communications, Chengdu, PR China
Abstract:This paper proposes an identity-based threshold decryption scheme IB-ThDec and reduces its security to the Bilinear Diffie-Hellman problem. Compared with previous work, this conceals two pairing computations in the ciphertext validity verification procedure. The formal proof of security of this scheme is provided in the random oracle model. Additionally, we show that IB-ThDec can be applied to the threshold key escrow and the mediated cryptosystems.
Keywords:Identity-based cryptography  Bilinear maps  Threshold decryption  Chosen-ciphertext attack  Pairing-based cryptosystem
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号