TY - GEN
T1 - Chosen ciphertext secure certificateless threshold encryption in the standard model
AU - Yang, Piyi
AU - Cao, Zhenfu
AU - Dong, Xiaolei
PY - 2009
Y1 - 2009
N2 - We propose the first secure Certificateless Threshold Encryption(CLTH-PKE) scheme against a malicious Key Generation Center(KGC) in the standard model. In this paper, we first define the new security model for CLTH-PKE. And then, we construct a new CLTH-PKEscheme with rigorous security proof against the attacks of a malicousKGC in the standard model based on Decisional Bilinear Diffie-Hellman(DBDH) assumption. Compared with the previous CLTH-PKE scheme proposed by Longet al. [13], our scheme is more secure. Since our scheme deals with a maliciousKGC and is proved secure in the standard model. Furthermore, our scheme does not need to compute pairings in the encryption phase. Therefore it is more efficient than Long et al.'s scheme [13].
AB - We propose the first secure Certificateless Threshold Encryption(CLTH-PKE) scheme against a malicious Key Generation Center(KGC) in the standard model. In this paper, we first define the new security model for CLTH-PKE. And then, we construct a new CLTH-PKEscheme with rigorous security proof against the attacks of a malicousKGC in the standard model based on Decisional Bilinear Diffie-Hellman(DBDH) assumption. Compared with the previous CLTH-PKE scheme proposed by Longet al. [13], our scheme is more secure. Since our scheme deals with a maliciousKGC and is proved secure in the standard model. Furthermore, our scheme does not need to compute pairings in the encryption phase. Therefore it is more efficient than Long et al.'s scheme [13].
KW - Certificateless threshold encryption
KW - Chosen cipher text attack
KW - Malicious KGC attack
KW - Standard model
UR - https://www.scopus.com/pages/publications/67650132557
U2 - 10.1007/978-3-642-01440-6_17
DO - 10.1007/978-3-642-01440-6_17
M3 - 会议稿件
AN - SCOPUS:67650132557
SN - 9783642014390
T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
SP - 201
EP - 216
BT - Information Security and Cryptology - 4th International Conference, Inscrypt 2008, Revised Selected Papers
T2 - 4th International Conference on Information Security and Cryptology, Inscrypt 2008
Y2 - 14 December 2008 through 17 December 2008
ER -