Selectively chosen ciphertext security in threshold public-key encryption

Kitak Kim, Jong Hwan Park, Dong Hoon Lee

    Research output: Contribution to journalArticlepeer-review

    1 Citation (Scopus)

    Abstract

    Threshold public-key encryption can control decryption abilities of an authorized user group in such a way that each user of the group can produce only a decryption share and at least t of them should collect decryption shares to recover a message. We present a new threshold public-key encryption that is secure against selectively chosen ciphertext attacks. Semantic security against chosen ciphertext adversaries is the de facto level of security for public-key encryption deployed in practice because many encryption systems are broken in a model of chosen ciphertext security. The security of the proposed system is formally proved without random oracles under a new assumption. We also provide proof of the intractability of our assumption in the generic group model.

    Original languageEnglish
    Pages (from-to)189-200
    Number of pages12
    JournalSecurity and Communication Networks
    Volume9
    Issue number3
    DOIs
    Publication statusPublished - 2016 Feb 1

    Bibliographical note

    Publisher Copyright:
    © 2016 John Wiley & Sons, Ltd.

    Keywords

    • Chosen ciphertext attacks
    • Chosen plaintext attacks
    • Threshold public-key encryption

    ASJC Scopus subject areas

    • Information Systems
    • Computer Networks and Communications

    Fingerprint

    Dive into the research topics of 'Selectively chosen ciphertext security in threshold public-key encryption'. Together they form a unique fingerprint.

    Cite this