CryptoDB
Identity-Based Threshold Decryption
Authors: | |
---|---|
Download: | |
Abstract: | In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identity-based threshold decryption scheme in which a private key associated with an identity is shared. A major contribution of this paper is to construct the first identity-based threshold decryption scheme secure against chosen ciphertext attack. A formal proof of security of the scheme is provided in the random oracle model, assuming the Bilinear Diffie-Hellman problem is computationally hard. Another contribution of this paper is, by extending the proposed identity-based threshold decryption scheme, to construct a mediated identity-based encryption scheme secure against more powerful attacks than those considered previously. |
BibTeX
@misc{eprint-2003-11878, title={Identity-Based Threshold Decryption}, booktitle={IACR Eprint archive}, keywords={cryptographic protocols /}, url={http://eprint.iacr.org/2003/164}, note={A short version of this paper is to appear in the proceedings of PKC 2004. joonsang.baek@infotech.monash.edu.au 12410 received 10 Aug 2003, last revised 23 Dec 2003}, author={Joonsang Baek and Yuliang Zheng}, year=2003 }