Identity-Based Threshold Decryption

  • Joonsang Baek
  • Yuliang Zheng
Conference paper

DOI: 10.1007/978-3-540-24632-9_19

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2947)
Cite this paper as:
Baek J., Zheng Y. (2004) Identity-Based Threshold Decryption. In: Bao F., Deng R., Zhou J. (eds) Public Key Cryptography – PKC 2004. PKC 2004. Lecture Notes in Computer Science, vol 2947. Springer, Berlin, Heidelberg

Abstract

In this paper, we examine issues related to the construction of identity-based threshold decryption schemes and argue that it is important in practice to design an identity-based threshold decryption scheme in which a private key associated with an identity is shared. A major contribution of this paper is to construct the first identity-based threshold decryption scheme secure against chosen-ciphertext attack. A formal proof of security of the scheme is provided in the random oracle model, assuming the Bilinear Diffie-Hellman problem is computationally hard. Another contribution of this paper is, by extending the proposed identity-based threshold decryption scheme, to construct a mediated identity-based encryption scheme secure against more powerful attacks than those considered previously.

Download to read the full conference paper text

Copyright information

© Springer-Verlag Berlin Heidelberg 2004

Authors and Affiliations

  • Joonsang Baek
    • 1
  • Yuliang Zheng
    • 2
  1. 1.School of Network ComputingMonash UniversityFrankstonAustralia
  2. 2.Dept. Software and Info. SystemsUNC CharlotteUSA

Personalised recommendations