Certificateless Threshold Decryption Scheme Secure in the Standard Model

被引:2
|
作者
Zhang, Guoyan [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250100, Peoples R China
来源
2009 2ND IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, VOL 2 | 2009年
关键词
IDENTITY-BASED ENCRYPTION;
D O I
10.1109/ICCSIT.2009.5234812
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Certificateless cryptography solves the key escrow problem inherent in identity-based cryptography. This paper first presents a practical model for certificateless threshold decryption scheme which avoids both the single point of failure in the distributed networks and the inherent key escrow problem in identity-based cryptosystem. Based on the idea of [9], The paper also introduces the first certificateless threshold decryption scheme that is IND-CCA secure against chosen ciphertext attack in the standard model.
引用
收藏
页码:414 / 418
页数:5
相关论文
共 50 条
  • [41] Anonymous and Efficient Certificateless Multirecipient Signcryption Scheme for Ecological Data Sharing
    Su, Pengfei
    Xie, Yong
    Liu, Ping
    JOURNAL OF SENSORS, 2020, 2020
  • [42] Provably CCA-Secure Anonymous Multi-Receiver Certificateless Authenticated Encryption
    Tseng, Yi-Fan
    Fan, Chun-I
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2018, 34 (06) : 1517 - 1541
  • [43] Secure and flexible keyword search over encrypted data with outsourced decryption in Internet of things
    Zhang, Yinghui
    Wu, Axin
    Zhang, Tiantian
    Zheng, Dong
    ANNALS OF TELECOMMUNICATIONS, 2019, 74 (7-8) : 413 - 421
  • [44] Secure Efficient History-Hiding Append-Only Signatures in the Standard Model
    Libert, Benoit
    Joye, Marc
    Yung, Moti
    Peters, Thomas
    PUBLIC-KEY CRYPTOGRAPHY - PKC 2015, 2015, 9020 : 450 - 473
  • [45] A fully secure lattice-based signcryption with designated equality test in standard model
    Xiao, Kaifeng
    Chen, Xinjian
    Li, Hongbo
    Huang, Jianye
    Susilo, Willy
    Huang, Qiong
    INFORMATION SCIENCES, 2024, 658
  • [46] A Fully Secure Spatial Encryption Scheme
    Moriyama, Daisuke
    Doi, Hiroshi
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 28 - 35
  • [47] Completely Anonymous Certificateless Multi-Receiver Signcryption Scheme with Sender Traceability
    Li, Huixian
    Wu, Chenhao
    Pang, Liaojun
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2022, 71
  • [48] Attribute-based signature scheme with constant size signature in the standard model
    Ge, A-J
    Ma, C-G
    Zhang, Z-F
    IET INFORMATION SECURITY, 2012, 6 (02) : 47 - 54
  • [49] CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications
    Wang, Yujue
    Pang, HweeHwa
    Ngoc Hieu Tran
    Deng, Robert H.
    INFORMATION SCIENCES, 2017, 414 : 289 - 305
  • [50] Adaptively Chosen Ciphertext Secure Lattice IBE Based Programmable Hash Function in the Standard Model
    Tang, Yongli
    Wang, Mingming
    Zhao, Zongqu
    Ye, Qing
    CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 468 - 478