Chosen ciphertext secure certificateless threshold encryption in the standard model

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

2 Scopus citations

Abstract

We propose the first secure Certificateless Threshold Encryption(CLTH-PKE) scheme against a malicious Key Generation Center(KGC) in the standard model. In this paper, we first define the new security model for CLTH-PKE. And then, we construct a new CLTH-PKEscheme with rigorous security proof against the attacks of a malicousKGC in the standard model based on Decisional Bilinear Diffie-Hellman(DBDH) assumption. Compared with the previous CLTH-PKE scheme proposed by Longet al. [13], our scheme is more secure. Since our scheme deals with a maliciousKGC and is proved secure in the standard model. Furthermore, our scheme does not need to compute pairings in the encryption phase. Therefore it is more efficient than Long et al.'s scheme [13].

Original languageEnglish
Title of host publicationInformation Security and Cryptology - 4th International Conference, Inscrypt 2008, Revised Selected Papers
Pages201-216
Number of pages16
DOIs
StatePublished - 2009
Externally publishedYes
Event4th International Conference on Information Security and Cryptology, Inscrypt 2008 - Beijing, China
Duration: 14 Dec 200817 Dec 2008

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume5487
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference4th International Conference on Information Security and Cryptology, Inscrypt 2008
Country/TerritoryChina
CityBeijing
Period14/12/0817/12/08

Keywords

  • Certificateless threshold encryption
  • Chosen cipher text attack
  • Malicious KGC attack
  • Standard model

Fingerprint

Dive into the research topics of 'Chosen ciphertext secure certificateless threshold encryption in the standard model'. Together they form a unique fingerprint.

Cite this