首页 | 本学科首页   官方微博 | 高级检索  
     检索      

ID-Based Threshold Decryption Secure Against Chosen Plaintext Attack
作者姓名:龙宇  陈克非  刘胜利
作者单位:Dept. of Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030 China,National Lab.of Modern Communications Chengdu 610041,Dept. of Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030 China,National Lab.of Modern Communications Chengdu 610041,Dept. of Computer Science and Eng. Shanghai Jiaotong Univ. Shanghai 200030 China
基金项目:NationalNaturalScienceFoundationofChina(Nos.60303026,60573030,90104005and60303026)andtheFoundationofNLMC(No.51436040405JW0304)
摘    要:Introduction Inthresholddecryptioncryptosystems,the powertodecryptissharedamongasetofdecryp-tionservers.In2001,D.BonehandM.Franklin proposedapracticalidentity-basedencryption(IBE)schemefromtheweilpairing.Combining thetwoconceptstogether,some“ID-basedthresh-olddecryption”schemeshavebeenconstructed.In suchschemes,anentity'spublickeyisderiveddi-rectlyfromitsidentity.Atrustedthirdparty calledtheprivatekeygenerator(PKG)usesthe masterkeytogenerateprivatekeysforallentities.Eachdecryptionserve…

关 键 词:ID号  解密方法  循环方式  密码术
文章编号:1007-1172(2006)02-0127-07
收稿时间:2005-10-10

ID-Based Threshold Decryption Secure Against Chosen Plaintext Attack
LONG Yu,CHEN Ke-fei,LIU Sheng-li.ID-Based Threshold Decryption Secure Against Chosen Plaintext Attack[J].Journal of Shanghai Jiaotong university,2006,11(2):127-133.
Authors:LONG Yu  CHEN Ke-fei  LIU Sheng-li
Abstract:B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext attack(CPA), based on the weaker model of security known as selective ID-based threshold CPA and the common model known as ID-based threshold CPA respectively.
Keywords:threshold decryption  identity-based cryptology  publicly checkable encryption
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号