ID-based threshold decryption without random oracles and its application in key escrow

  • Zhenchuan Chai*
  • , Zhenfu Cao
  • , Rongxing Lu
  • *Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

23 Scopus citations

Abstract

In this paper, we first present an ID-based threshold decryption scheme ThD based on bilinear Diffie-Hellman inversion assumption, and prove that it is selective chosen plaintext secure without random oracles. Then, we enhance ThD to a more secure level with ciphertext validation test before decryption. At last, we apply ThD to key escrow, resulting in a robust threshold key escrow system.

Original languageEnglish
Title of host publicationProceedings of the 3rd International Conference on Information Security, InfoSecu '04
Pages119-124
Number of pages6
DOIs
StatePublished - 2004
Externally publishedYes
Event3rd International Conference on Information Security, InfoSecu '04 - Shanghai, China
Duration: 14 Nov 200416 Nov 2004

Publication series

NameACM International Conference Proceeding Series
Volume85

Conference

Conference3rd International Conference on Information Security, InfoSecu '04
Country/TerritoryChina
CityShanghai
Period14/11/0416/11/04

Keywords

  • ID-based cryptography
  • Key escrow
  • Threshold decryption

Fingerprint

Dive into the research topics of 'ID-based threshold decryption without random oracles and its application in key escrow'. Together they form a unique fingerprint.

Cite this