Certificateless Threshold Decryption Scheme Secure in the Standard Model

被引:2
|
作者
Zhang, Guoyan [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250100, Peoples R China
来源
2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2 | 2009年
关键词
IDENTITY-BASED ENCRYPTION;
D O I
10.1109/ICCSIT.2009.5234812
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless cryptography solves the key escrow problem inherent in identity-based cryptography. This paper first presents a practical model for certificateless threshold decryption scheme which avoids both the single point of failure in the distributed networks and the inherent key escrow problem in identity-based cryptosystem. Based on the idea of [9], The paper also introduces the first certificateless threshold decryption scheme that is IND-CCA secure against chosen ciphertext attack in the standard model.
引用
收藏
页码:414 / 418
页数:5
相关论文
共 50 条
  • [1] Chosen Ciphertext Secure Certificateless Threshold Encryption in the Standard Model
    Yang, Piyi
    Cao, Zhenfu
    Dong, Xiaolei
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 201 - 216
  • [2] Cryptanalysis and Improvement of a New Certificateless Signature Scheme in the Standard Model
    Wu, Chenhuang
    Huang, Hui
    Zhou, Kun
    Xu, Chunxiang
    CHINA COMMUNICATIONS, 2021, 18 (01) : 151 - 160
  • [3] A Secure and Efficient Certificateless Aggregate Signature Scheme
    Liu, He
    Liang, Mangui
    Sun, Haoliang
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (04) : 991 - 995
  • [4] A Certificateless Threshold Public Key Encryption Scheme
    ZOU Xiubin1
    2.College of Computer and Mathematics
    3.Ira A.Fulton Schools of Engineering
    Wuhan University Journal of Natural Sciences, 2012, 17 (03) : 223 - 228
  • [5] Certificateless Signcryption in the Standard Model
    Zhou, Caixue
    Gao, Guangyong
    Cui, Zongmin
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 92 (02) : 495 - 513
  • [6] Certificateless encryption scheme with provable security in the standard model suitable for mobile devices
    Deng, Lunzhi
    Feng, Shuai
    Chen, Zhiwei
    INFORMATION SCIENCES, 2022, 613 : 228 - 238
  • [7] Certificateless designated verifier signature revisited: achieving a concrete scheme in the standard model
    Rastegari, Parvin
    Susilo, Willy
    Dakhilalian, Mohammad
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2019, 18 (05) : 619 - 635
  • [8] Efficient Certificateless KEM in the Standard Model
    Lippold, Georg
    Boyd, Colin
    Nieto, Juan Manuel Gonzalez
    INFORMATION SECURITY AND CRYPTOLOGY - ISISC 2009, 2010, 5984 : 34 - 46
  • [9] An efficient and provably secure IBE scheme under the standard model
    Xu P.
    Cui G.-H.
    Lei F.-Y.
    Tang X.-M.
    Chen J.
    Jisuanji Xuebao/Chinese Journal of Computers, 2010, 33 (02): : 335 - 344
  • [10] Certificateless Public Key Cryptography in the Standard Model
    Canard, Sebastien
    Viet Cuong Trinh
    FUNDAMENTA INFORMATICAE, 2018, 161 (03) : 219 - 248