Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing

  • Authors:
  • Yu Long;Kefei Chen;Shengli Liu

  • Affiliations:
  • Department of Computer Science and Engineering, Shanghai Jiao Tong University & National Laboratory of Modern Communications, 800 Dongchuan Road, Shanghai 200240, P. R. China, e-mail: longyu@sjtu. ...;Department of Computer Science and Engineering, Shanghai Jiao Tong University & National Laboratory of Modern Communications, 800 Dongchuan Road, Shanghai 200240, P. R. China, e-mail: longyu@sjtu. ...;Department of Computer Science and Engineering, Shanghai Jiao Tong University, 800 Dongchuan Road, Shanghai 200240, P. R. China

  • Venue:
  • Informatica
  • Year:
  • 2006

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversary that can make corrupted servers to deviate from the protocol. The scheme is secure against threshold adaptive chosen-ciphertext attack. The formal proof of security is presented in the random oracle model, assuming the decision Bilinear Diffie-Hellman problem is computationally hard.