Author:
Gao Ronghai,Zeng Jiwen,Deng Lunzhi
Abstract
Threshold decryption allows only quorum cooperate users to decrypt ciphertext encrypted under a public key. However, such threshold decryption scheme cannot be applied well in this situation where all users have their public and private key pairs, but do not share any private keys corresponding to the public keys, such as mobile network featured with dynamic character. The direct way to achieve threshold decryption in this case is to divide the message into several pieces and then encrypt these pieces with the public keys of different users. However, this is very inefficient. Multireceiver threshold decryption scheme that could be applied efficiently in the above situation. Recently, some certificateless (ID-based) multireceiver threshold decryption (signcryption) schemes are introduced. But the bilinear pairings are used in most of the existing schemes. In this paper, we propose an efficient certificateless threshold decryption scheme using elliptic curve cryptography (ECC) without bilinear pairing. Performance analysis shows that the proposed scheme has lower computation cost than existing some threshold decryption schemes in both encryption and decryption process. Security analysis shows that our scheme is IND-CCA secure, and no one outside of selected receivers can disclose receivers identities, against the adversaries defined in CL-PKC system under the random oracle model.
Subject
Computer Science Applications,General Mathematics,Software
Reference29 articles.
1. Al-Riyami S.S. and
Paterson K.G.,
Certificateless public key cryptography,
in
Proc. of the Ninth International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan
(2003) 452–473.
2. Boneh D. and
Franklin M., Identity-based encryption from the Weil pairing, in Proceeding of Advances in Cryptology – CRYPTO 2001, edited by
Kilian. J. Vol. 2139 of
Lecture Notes in Computer Science.
Springer-Verlag,
New York
(2001) 213–229.
3. Chai Z.,
Cao Z. and
Lu R., ID-based threshold decryption without random oracles and its application in key escrow, in
Proc. of the 3rd International Conference on Information Security.
ACM International Conference Proceeding Series
(2004).
4. Chai Z.,
Cao Z. and
Zhou Y., Effient ID-based broadcast threshold decryption in ad hoc network, in
First International Multi-symposiums on Computer and Computational Sciences (IMSCCS’06), Hangzhou, China, June 20–24
(2006).
5. EFFICIENT ID-BASED MULTI-RECEIVER THRESHOLD DECRYPTION
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献