Society and Group Oriented Cryptography: A New Concept
CRYPTO '87 A Conference on the Theory and Applications of Cryptographic Techniques on Advances in Cryptology
How to (Really) Share a Secret
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Generalized Secret Sharing and Monotone Functions
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
Secure Integration of Asymmetric and Symmetric Encryption Schemes
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
ID-based threshold decryption secure against adaptive chosen-ciphertext attack
Computers and Electrical Engineering
An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks
Computer Communications
Certificate-based encryption and the certificate revocation problem
EUROCRYPT'03 Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques
Extensions of access structures and their cryptographic applications
Applicable Algebra in Engineering, Communication and Computing
Security proof of sakai-kasahara's identity-based encryption scheme
IMA'05 Proceedings of the 10th international conference on Cryptography and Coding
Hi-index | 0.00 |
The protection of sensitive information is very important, but also a difficult task. It usually requires a centralised access policy management and control system. However, such solution is often not acceptable in the era of users' mobility. In the paper we propose a certificate-based group-oriented encryption scheme with an effective secret sharing scheme based on general access structure. The special design of the scheme ensures that the shared secret (encryption key information), a collection of shareholders, and the access structure can be dynamically changed without the need to update the long-term keys and shares owned by shareholders. It is also possible to delegate the access rights to another member of the qualified subgroup or to a new entity from outside the current access structure.