ID-based threshold decryption secure against adaptive chosen-ciphertext attack |
| |
Authors: | Yu Long [Author Vitae] Kefei Chen [Author Vitae] Shengli Liu [Author Vitae] |
| |
Affiliation: | a Department of Computer Science and Engineering, Shanghai Jiao Tong University, P.O. Box A0403391, 800 Dongchuan Road, Shanghai 200240, PR China b National Laboratory of Modern Communications, Chengdu, PR China |
| |
Abstract: | This paper proposes an identity-based threshold decryption scheme IB-ThDec and reduces its security to the Bilinear Diffie-Hellman problem. Compared with previous work, this conceals two pairing computations in the ciphertext validity verification procedure. The formal proof of security of this scheme is provided in the random oracle model. Additionally, we show that IB-ThDec can be applied to the threshold key escrow and the mediated cryptosystems. |
| |
Keywords: | Identity-based cryptography Bilinear maps Threshold decryption Chosen-ciphertext attack Pairing-based cryptosystem |
本文献已被 ScienceDirect 等数据库收录! |