Identity-based threshold decryption on access structure

2011 ◽  
Vol 16 (4) ◽  
pp. 485-489
Author(s):  
Hua-wang Qin ◽  
Xiao-hua Zhu ◽  
Yue-wei Dai
2010 ◽  
Vol 15 (3) ◽  
pp. 222-226 ◽  
Author(s):  
Leyou Zhang ◽  
Yupu Hu ◽  
Xu’an Tian ◽  
Yang Yang

2017 ◽  
Vol 12 (1) ◽  
pp. 177-189
Author(s):  
Wei Gao ◽  
Guilin Wang ◽  
Kefei Chen ◽  
Xueli Wang

2007 ◽  
Vol 18 (05) ◽  
pp. 987-1004 ◽  
Author(s):  
ZHENCHUAN CHAI ◽  
ZHENFU CAO ◽  
XIAOLEI DONG

Threshold decryption allows a message encrypted under a public key to be read only when a quorum of users cooperate to decrypt the ciphertext. However, such threshold decryption scheme does not apply well in the situation where all the users have their own public/private key pairs, but not share any private key associated with a public key, such as mobile ad hoc network featured by its dynamic character. An immediate way to achieve threshold decryption in this situation is to split the message into pieces, then encrypt these pieces under the public keys of different users. However, it is not efficient. In this paper, we propose an efficient identity based multi-receiver threshold decryption scheme that could be applied efficiently in the above situation. We also define the security notions and prove the security in random oracle model. At last, we add the broadcast feature to the scheme, such that a message could be broadcast to any number of groups.


2012 ◽  
Vol 2 (11) ◽  
pp. 203-205
Author(s):  
S. Ali Ahmed S. Ali Ahmed ◽  
◽  
Syed Jahangir Badashah ◽  
A. Farooq Hussain

Sign in / Sign up

Export Citation Format

Share Document