ID-based threshold decryption secure against adaptive chosen-ciphertext attack

  • Authors:
  • Yu Long;Kefei Chen;Shengli Liu

  • Affiliations:
  • Department of Computer Science and Engineering, Shanghai Jiao Tong University, P.O. Box A0403391, 800 Dongchuan Road, Shanghai 200240, PR China and National Laboratory of Modern Communications, Ch ...;Department of Computer Science and Engineering, Shanghai Jiao Tong University, P.O. Box A0403391, 800 Dongchuan Road, Shanghai 200240, PR China and National Laboratory of Modern Communications, Ch ...;Department of Computer Science and Engineering, Shanghai Jiao Tong University, P.O. Box A0403391, 800 Dongchuan Road, Shanghai 200240, PR China

  • Venue:
  • Computers and Electrical Engineering
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

This paper proposes an identity-based threshold decryption scheme IB-ThDec and reduces its security to the Bilinear Diffie-Hellman problem. Compared with previous work, this conceals two pairing computations in the ciphertext validity verification procedure. The formal proof of security of this scheme is provided in the random oracle model. Additionally, we show that IB-ThDec can be applied to the threshold key escrow and the mediated cryptosystems.