期刊文献+

A Certificateless Threshold Public Key Encryption Scheme

A Certificateless Threshold Public Key Encryption Scheme
原文传递
导出
摘要 The decryption participant's private key share for decryption is delegated by key generation center in the threshold IBE scheme.However,a key generation center which is absolutely trustworthy does not exist.So the author presents a certificateless threshold public key encryption scheme.Collaborating with an administrator,the decryption participant generates his whole private key share for decryption in the scheme.The administrator does not know the decryption participant's private key share for decryption.Making use of q-SDH assumption,the author constructs a certificateless threshold public key encryption scheme.The security of the scheme is eventually reduced to the solving of Decisional Bilinear Diffie-Hellman problem.Moreover,the scheme is secure under the chosen ciphertext attack in the standard model. The decryption participant's private key share for decryption is delegated by key generation center in the threshold IBE scheme.However,a key generation center which is absolutely trustworthy does not exist.So the author presents a certificateless threshold public key encryption scheme.Collaborating with an administrator,the decryption participant generates his whole private key share for decryption in the scheme.The administrator does not know the decryption participant's private key share for decryption.Making use of q-SDH assumption,the author constructs a certificateless threshold public key encryption scheme.The security of the scheme is eventually reduced to the solving of Decisional Bilinear Diffie-Hellman problem.Moreover,the scheme is secure under the chosen ciphertext attack in the standard model.
出处 《Wuhan University Journal of Natural Sciences》 CAS 2012年第3期223-228,共6页 武汉大学学报(自然科学英文版)
基金 Supported by the National Natural Science Foundation of China(60903175,60703048) the Natural Science Foundation of Hubei Province (2009CBD307,2008CDB352)
关键词 certificateless public key cryptosystem identity-based encryption threshold public key encryption decisional bilinear Diffie-Hellman assumption bilinear pairings certificateless public key cryptosystem identity-based encryption threshold public key encryption decisional bilinear Diffie-Hellman assumption bilinear pairings
  • 相关文献

参考文献12

  • 1Shamir A. Identity-based cryptosystems and signature schemes [C]// Advances in Cryptology. New York: Springer-Verlag, 1985: 47-53.
  • 2Boneh D, Franklin M. Identity-based encryption from the Weil pairing[C]//Advances in Cryptology-CRYPTO 2001. New York: Springer-Verlag, 2001:213-229.
  • 3Boneh D, Boyen X. Efficient selective-ID secure identity- based encryption without random oracles [C]//Advances in Cryptology-EUROCRYPT 2004. New York: Springer-Verlag, 2004: 223-238.
  • 4Waters B. Efficient identity-based encryption without random oracles[C]//Advances in Cryptology EUROCRYPT 2005. New York: Springer-Veriag, 2005:114-127.
  • 5Boneh D, Boyen X, Goh E J encryption with constant size Cryptology EUROCRYPT 2005 2005: 440-456. Hierarchical identity based ciphertext[C]//Advances in New York: Springer-Verlag,.
  • 6Desmedt Y, Frankel Y. Threshold cryptosystems [C]//Advances in Cryptology-CRYPTO'89. New York: Springer-Verlag, 1990: 307-315.
  • 7Canetti R, Goldwasser S. An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack[C]//Advances in Cryptology-EUROCRYPT'99. New York: Springer-Verlag, 1999: 90-106.
  • 8Shoup V, Gennaro R. Securing threshold cryptosystems against chosen ciphertext attack[ C]//Advances in Cryptology- EUROCRYPT'98. NewYork: Spfinger-Verlag, 1998: 1-16.
  • 9Boneh D, Boyen X, Halevi S. Chosen ciphertext secure public key threshold encryption without random oracles [C]//Topics in Cryptology-CT-RSA 2006. New York: Springer-Verlag, 2006: 226-243.
  • 10Al-Riyami S, Paterson K. Certificateless public key crypto- graphy[C]//Advances in Cryptology-ASIACRYPT 2003. New York: Springer-Verlag, 2003: 452-473.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部