Article ID Journal Published Year Pages File Type
455493 Computers & Electrical Engineering 2007 11 Pages PDF
Abstract

This paper proposes an identity-based threshold decryption scheme IB-ThDec and reduces its security to the Bilinear Diffie–Hellman problem. Compared with previous work, this conceals two pairing computations in the ciphertext validity verification procedure. The formal proof of security of this scheme is provided in the random oracle model. Additionally, we show that IB-ThDec can be applied to the threshold key escrow and the mediated cryptosystems.

Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, , ,