Certificateless Threshold Decryption Scheme Secure in the Standard Model

被引:2
|
作者
Zhang, Guoyan [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250100, Peoples R China
来源
2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2 | 2009年
关键词
IDENTITY-BASED ENCRYPTION;
D O I
10.1109/ICCSIT.2009.5234812
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless cryptography solves the key escrow problem inherent in identity-based cryptography. This paper first presents a practical model for certificateless threshold decryption scheme which avoids both the single point of failure in the distributed networks and the inherent key escrow problem in identity-based cryptosystem. Based on the idea of [9], The paper also introduces the first certificateless threshold decryption scheme that is IND-CCA secure against chosen ciphertext attack in the standard model.
引用
收藏
页码:414 / 418
页数:5
相关论文
共 50 条
  • [21] Lattice-based certificateless public-key encryption in the standard model
    Sepahi, Reza
    Steinfeld, Ron
    Pieprzyk, Josef
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2014, 13 (04) : 315 - 333
  • [22] An Anonymous Signature Scheme in the Standard Model
    Wang, Bin
    Hong, Xiaojing
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2014, 30 (06) : 2003 - 2017
  • [23] Full secure identity-based encryption scheme with short public key size over lattices in the standard model
    Wang, Fenghe
    Liu, ZhenHua
    Wang, Chunxiao
    INTERNATIONAL JOURNAL OF COMPUTER MATHEMATICS, 2016, 93 (06) : 854 - 863
  • [24] Adaptively Secure Constrained Pseudorandom Functions in the Standard Model
    Davidson, Alex
    Katsumata, Shuichi
    Nishimaki, Ryo
    Yamada, Shota
    Yamakawa, Takashi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2020, PT I, 2020, 12170 : 559 - 589
  • [25] Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model
    Hohenberger, Susan
    Koppula, Venkata
    Waters, Brent
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT I, 2015, 9452 : 79 - 102
  • [26] Certificateless Signcryption Scheme Without Random Oracles
    Zhou Caixue
    CHINESE JOURNAL OF ELECTRONICS, 2018, 27 (05) : 1002 - 1008
  • [27] EFFICIENT CERTIFICATELESS THRESHOLD SIGNATURES WITHOUT RANDOM ORACLES
    Yang, Piyi
    Cao, Zhenfu
    Dong, Xiaolei
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2010, 23 (06) : 1167 - 1182
  • [28] Leakage-Resilient Certificateless Key Encapsulation Scheme
    Wu, Jui-Di
    Tseng, Yuh-Min
    Huang, Sen-Shan
    Chou, Wei-Chieh
    INFORMATICA, 2018, 29 (01) : 125 - 155
  • [29] An Adaptive Secure and Practical Data Sharing System With Verifiable Outsourced Decryption
    Xu, Shengmin
    Han, Xingshuo
    Xu, Guowen
    Ning, Jianting
    Huang, Xinyi
    Deng, Robert H.
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2024, 17 (03) : 776 - 788
  • [30] An Efficient Certificate less Encryption Scheme in the Standard Model
    Guo, Hua
    Zhang, Xiyong
    Mu, Yi
    Li, Zhoujun
    NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, 2009, : 302 - +