Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
The State of Elliptic Curve Cryptography
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Society and Group Oriented Cryptography: A New Concept
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
ID-Based Blind Signature and Ring Signature from Pairings
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
A Solution to Generalized Group Oriented Cryptography
IFIP/Sec '92 Proceedings of the IFIP TC11, Eigth International Conference on Information Security: IT Security: The Need for International Cooperation
Efficient revocation and threshold pairing based cryptosystems
Proceedings of the twenty-second annual symposium on Principles of distributed computing
A threshold signature scheme for group communications without a shared distribution center
Future Generation Computer Systems - Special issue: Computational science of lattice Boltzmann modelling
ID-based threshold decryption without random oracles and its application in key escrow
InfoSecu '04 Proceedings of the 3rd international conference on Information security
Securing Mobile Ad Hoc Networks with Certificateless Public Keys
IEEE Transactions on Dependable and Secure Computing
ID-based restrictive partially blind signatures and applications
Journal of Systems and Software
ID-based threshold decryption secure against adaptive chosen-ciphertext attack
Computers and Electrical Engineering
A Convertible Multi-Authenticated Encryption scheme for group communications
Information Sciences: an International Journal
Research notes: Method for constructing a group-oriented cipher system
Computer Communications
New directions in cryptography
IEEE Transactions on Information Theory
Research note: New generalized group-oriented cryptosystem based on Diffie-Hellman scheme
Computer Communications
A new generalized group-oriented cryptoscheme without trusted centers
IEEE Journal on Selected Areas in Communications
An ID-based multi-signer universal designated multi-verifier signature scheme
Information and Computation
Certificate-Based encryption scheme with general access structure
CISIM'12 Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management
Hi-index | 0.24 |
ID-based decryption allows a sender to encrypt a message to an identity without access to a public key certificate. This paper proposes an ID-based group-oriented decryption scheme, secure against adaptive chosen-ciphertext attacks, which allows the sender to determine an access structure and generate a valid ciphertext on the chosen message. The correctness of decryption shares can be checked to detect when dishonest users in the access structure provide fake decryption shares. As a result, the message can be cooperatively recovered by users in the determined access structure. The formal proof of security of our scheme is based on the bilinear Diffie-Hellman problem in the random oracle model. Our proposed scheme is more efficient and provides higher security confidence than those in Li et al.'s certificate-based group-oriented decryption scheme.