Modified ID-based threshold decryption and its application to mediated ID-based encryption

  • Hak Soo Ju*
  • , Dae Youb Kim
  • , Dong Hoon Lee
  • , Haeryong Park
  • , Kilsoo Chun
  • *Corresponding author for this work

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)

    Abstract

    Chai, Cao and Lu first proposed an ID-based threshold decryption scheme without random oracles. Their approach is based on the Bilinear Diffie-Hellman Inversion assumption, and prove that it is selective chosen plaintext secure without random oracles. However, to ensure correctness of their ID-based threshold decryption scheme, it is necessary to guarantee that the shared decryption is performed correctly through some public verification function. We modify Chai et al.'s scheme to ensure that all decryption shares are consistent. We also present the first mediated ID based encryption scheme based on the Bilinear Diffie Hellman Inversion assumption without random oracles. In addition, we extend it into a mediated hierarchical ID-based encryption scheme.

    Original languageEnglish
    Title of host publicationFrontiers of WWW Research and Development - APWeb 2006 - 8th Asia-Pacific Web Conference, Proceedings
    Pages720-725
    Number of pages6
    DOIs
    Publication statusPublished - 2006
    Event8th Asia-Pacific Web Conference, APWeb 2006: Frontiers of WWW Research and Development - Harbin, China
    Duration: 2006 Jan 162006 Jan 18

    Publication series

    NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
    Volume3841 LNCS
    ISSN (Print)0302-9743
    ISSN (Electronic)1611-3349

    Other

    Other8th Asia-Pacific Web Conference, APWeb 2006: Frontiers of WWW Research and Development
    Country/TerritoryChina
    CityHarbin
    Period06/1/1606/1/18

    ASJC Scopus subject areas

    • Theoretical Computer Science
    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Modified ID-based threshold decryption and its application to mediated ID-based encryption'. Together they form a unique fingerprint.

    Cite this