Identity-based cryptosystems and signature schemes
Proceedings of CRYPTO 84 on Advances in cryptology
Relations Among Notions of Security for Public-Key Encryption Schemes
CRYPTO '98 Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
Hierarchical ID-Based Cryptography
ASIACRYPT '02 Proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Efficient revocation and threshold pairing based cryptosystems
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Efficient Selective Identity-Based Encryption Without Random Oracles
Journal of Cryptology
The Algorithm to Enhance the Security of Multi-Agent in Distributed Computing Environment
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 2
An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks
Computer Communications
Modified ID-Based threshold decryption and its application to mediated ID-Based encryption
APWeb'06 Proceedings of the 8th Asia-Pacific Web conference on Frontiers of WWW Research and Development
Hi-index | 0.00 |
In this paper, we first present an ID-based threshold decryption scheme ThD based on bilinear Diffie-Hellman inversion assumption, and prove that it is selective chosen plaintext secure without random oracles. Then, we enhance ThD to a more secure level with ciphertext validation test before decryption. At last, we apply ThD to key escrow, resulting in a robust threshold key escrow system.