Title :
Provably Secure Identity-Based Threshold Decryption on Access Structure
Author :
Huawang Qin ; Xiaohua Zhu ; Yuewei Dai
Author_Institution :
Sch. of Automatization, Nanjing Univ. of Sci. & Technol., Nanjing, China
Abstract :
The existing provably secure threshold decryption schemes based on the Lagrange interpolation can only be applied to the (t, n) threshold structure. The first provably secure identity-based threshold decryption scheme on access structure is proposed, in which the PKG gets the adversary structure from the access structure, and then according to the adversary structure, the PKG ingeniously distributes the private key shares through the knowledge of set theory, to guarantee only the participants in the "qualified subset" can decrypt the ciphertext. The validity of the proposed scheme is proved perfectly, and the formal proof of adaptive chosen-ciphertext security is provided in the random oracle model. Compared to the existing schemes, the proposed scheme has obvious advantages on the performance of applied range and computational overhead.
Keywords :
authorisation; private key cryptography; set theory; PKG; access structure; adaptive chosen-ciphertext security; adversary structure; ciphertext decryption; formal proof; ingeniously distributed private key; provably secure identity-based threshold decryption; random oracle model; set theory; Algorithm design and analysis; Computers; Encryption; Interpolation; Silicon; access structure; cryptography; identity; provably security; threshold decryption;
Conference_Titel :
Computational Intelligence and Security (CIS), 2014 Tenth International Conference on
Conference_Location :
Kunming
Print_ISBN :
978-1-4799-7433-7
DOI :
10.1109/CIS.2014.23