Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
455493 | Computers & Electrical Engineering | 2007 | 11 Pages |
Abstract
This paper proposes an identity-based threshold decryption scheme IB-ThDec and reduces its security to the Bilinear Diffie–Hellman problem. Compared with previous work, this conceals two pairing computations in the ciphertext validity verification procedure. The formal proof of security of this scheme is provided in the random oracle model. Additionally, we show that IB-ThDec can be applied to the threshold key escrow and the mediated cryptosystems.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Yu Long, Kefei Chen, Shengli Liu,