Abstract
We present an identity-based threshold decryption scheme, which is secure against adaptive chosen ciphertext attack (IND-CCA) in the random oracle and generic model (ROM+GM). In our scheme, a one-time Schnorr signature is used for public checkability of ciphertexts, and a new method was proposed to distribute the shares of the decryption key to decrease the number of bilinear pairings involved. Hence our scheme is more efficient than the recent proposals by Baek and Zheng in [1] and by Kiltz and Galindo in [13].
The work is supported by NSFC under the grant no. 60673077, 60573030, and the National 863 Project under grant no. 2006AA01Z422.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Baek, J., Zheng, Y.: Identity-Based Threshold Decryption. In: Bao, F., Deng, R., Zhou, J. (eds.) PKC 2004. LNCS, vol. 2947, pp. 262–276. Springer, Heidelberg (2004)
Boneh, D., Franklin, M.: Identity-Based encryption from the Weil pairing. In: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–229. Springer, Heidelberg (2001)
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 566–582. Springer, Heidelberg (2001)
Cocks, C.: An identity based encryption scheme based on quadratic residues. In: Proceedings of the 8th IMA International Confreence on Cryptography and Coding, pp. 8–26 (2001)
Chaum, D., Pedersen, T.: Wallet databases with observers. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol. 740, pp. 89–105. Springer, Heidelberg (1993)
Dodis, Y., Yung, M.: Exposure-resilience for free: the hierarchical id-based encryption case. In: Proceedings of IEEE security in Storage Workshop, pp. 45–52 (2002)
Fujisaki, E., Okamoto, T.: Secure Integration of Asymmetric and Symmetric Encryption Schemes. In: Wiener, M.J. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 537–554. Springer, Heidelberg (1999)
Fiat, A., Shamir, A.: How to Prove Yourself: Practical Solution to Identification and Signature Problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–189. Springer, Heidelberg (1987)
Page, D.L., Smart, N.P., Granger, R.: High Security Pairing-Based Cryptography Revisited. In: Hess, F., Pauli, S., Pohst, M. (eds.) ANTS 2006. LNCS, vol. 4076, pp. 480–494. Springer, Heidelberg (2006)
Hui, L.C.K., Lam, K.-Y.: Fast square-and-multiply exponentiation for RSA. Electron. Lett. 30(17), 1396–1397 (1994)
Jakobsson, M.: A practical mix. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 448–461. Springer, Heidelberg (1998)
Kiltz, E., Galindo, D.: Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles, iacr.org/2006/034.ps.gz
Libert, B., Quisquater, J.: Efficient revocation and threshold pairing based cryptosystems. In: Principles of Distributed Computing (2003)
Lim, C.H., Lee, P.J.: Another method for attaining security against adaptively chosen ciphertext attacks. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, Springer, Heidelberg (1994)
Mao, W.: Modern Cryptography: Theory and Practice, pp. 528–530. Prentice Hall PTR, Englewood Cliffs (2004)
Nechaev, V.I.: Complexity of a determinate algorithm for the discrete logarithm. Mathematical Notes 55, 165–172 (1994)
Scott, M.: Implementing cryptographic pairings. In: 10th workshop on Elliptic Curve Cryptography (ECC 2006), September 18-20 (2006), http://www.cacr.math.uwaterloo.ca/conferences/2006/ecc2006/slides.html
Shamir, A.: Identity-based cryptosystems and siganture schemes. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
Shamir, A.: How to share a secret. Communications of the ACM 22, 612–613 (1979)
Schnorr, C.P., Jacobsson, M.: Security of signed ElGamal encryption. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 73–88. Springer, Heidelberg (2000)
Gennaro, R., Shoup, V.: Securing Threshold Cryptosystems against Chosen Ciphertext Attack. In: Nyberg, K. (ed.) EUROCRYPT 1998. LNCS, vol. 1403, pp. 1–16. Springer, Heidelberg (1998)
Shoup, V., Genarro, R.: Securing Threshold Cryptosystems against Chosen Ciphertext Attacks. J. Cryptology 15(2), 75–96 (2002)
Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 256–266. Springer, Heidelberg (2000)
Tsiounis, Y., Yung, M.: On the Security of El Gamal based Encryption. In: Imai, H., Zheng, Y. (eds.) PKC 1998. LNCS, vol. 1431, pp. 117–134. Springer, Heidelberg (1998)
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2007 Springer Berlin Heidelberg
About this paper
Cite this paper
Liu, S., Chen, K., Qiu, W. (2007). Identity-Based Threshold Decryption Revisited. In: Dawson, E., Wong, D.S. (eds) Information Security Practice and Experience. ISPEC 2007. Lecture Notes in Computer Science, vol 4464. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-72163-5_25
Download citation
DOI: https://doi.org/10.1007/978-3-540-72163-5_25
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-72159-8
Online ISBN: 978-3-540-72163-5
eBook Packages: Computer ScienceComputer Science (R0)