A two-party combined cryptographic scheme and its application

Shengbao Wang, Qi Xie, Qiang Tang, Zeng Peng, Chen Wei

Research output: Contribution to journalArticlepeer-review

Abstract

In this paper, we extend Haber and Pinkas' notion of combined (cryptographic) scheme to the twoparty setting, which is shown to be a useful tool in some real-world application which we name the "2-boss problem". In a two-party combined scheme, a single public key associated with two independent private keys and one escrow decryption key is provided. Any ciphertext encrypted under the public key can be simultaneously decrypted by the three keys. Meanwhile, the two private keys can also be used as signing keys to achieve non-repudiation service. We provide formal security definitions for two-party combined schemes, and present a simple and efficient scheme. Our construction is derived from bilinear pairings, and the security is based on the Bilinear Diffie-Hellman (BDH) assumption.

Original languageEnglish
Pages (from-to)687-691
Number of pages5
JournalChinese Journal of Electronics
Volume21
Issue number4
StatePublished - Oct 2012

Keywords

  • Bilinear pairings
  • Combined scheme
  • Digital signature
  • Provable security
  • Public key encryption

Fingerprint

Dive into the research topics of 'A two-party combined cryptographic scheme and its application'. Together they form a unique fingerprint.

Cite this