Modified ID-based threshold decryption and its application to mediated ID-based encryption

Hak Soo Ju, Dae Youb Kim, Dong Hoon Lee, Haeryong Park, Kilsoo Chun

Research output: Chapter in Book/Report/Conference proceedingConference contribution

7 Citations (Scopus)

Abstract

Chai, Cao and Lu first proposed an ID-based threshold decryption scheme without random oracles. Their approach is based on the Bilinear Diffie-Hellman Inversion assumption, and prove that it is selective chosen plaintext secure without random oracles. However, to ensure correctness of their ID-based threshold decryption scheme, it is necessary to guarantee that the shared decryption is performed correctly through some public verification function. We modify Chai et al.'s scheme to ensure that all decryption shares are consistent. We also present the first mediated ID based encryption scheme based on the Bilinear Diffie Hellman Inversion assumption without random oracles. In addition, we extend it into a mediated hierarchical ID-based encryption scheme.

Original languageEnglish
Title of host publicationLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Pages720-725
Number of pages6
Volume3841 LNCS
DOIs
Publication statusPublished - 2006 Jul 6
Event8th Asia-Pacific Web Conference, APWeb 2006: Frontiers of WWW Research and Development - Harbin, China
Duration: 2006 Jan 162006 Jan 18

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3841 LNCS
ISSN (Print)03029743
ISSN (Electronic)16113349

Other

Other8th Asia-Pacific Web Conference, APWeb 2006: Frontiers of WWW Research and Development
CountryChina
CityHarbin
Period06/1/1606/1/18

Fingerprint

Identity-based
Encryption
Cryptography
Random Oracle
Threshold Scheme
Diffie-Hellman
Inversion
Correctness
Necessary

ASJC Scopus subject areas

  • Computer Science(all)
  • Biochemistry, Genetics and Molecular Biology(all)
  • Theoretical Computer Science

Cite this

Ju, H. S., Kim, D. Y., Lee, D. H., Park, H., & Chun, K. (2006). Modified ID-based threshold decryption and its application to mediated ID-based encryption. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3841 LNCS, pp. 720-725). (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3841 LNCS). https://doi.org/10.1007/11610113_64

Modified ID-based threshold decryption and its application to mediated ID-based encryption. / Ju, Hak Soo; Kim, Dae Youb; Lee, Dong Hoon; Park, Haeryong; Chun, Kilsoo.

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3841 LNCS 2006. p. 720-725 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); Vol. 3841 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ju, HS, Kim, DY, Lee, DH, Park, H & Chun, K 2006, Modified ID-based threshold decryption and its application to mediated ID-based encryption. in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). vol. 3841 LNCS, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 3841 LNCS, pp. 720-725, 8th Asia-Pacific Web Conference, APWeb 2006: Frontiers of WWW Research and Development, Harbin, China, 06/1/16. https://doi.org/10.1007/11610113_64
Ju HS, Kim DY, Lee DH, Park H, Chun K. Modified ID-based threshold decryption and its application to mediated ID-based encryption. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3841 LNCS. 2006. p. 720-725. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)). https://doi.org/10.1007/11610113_64
Ju, Hak Soo ; Kim, Dae Youb ; Lee, Dong Hoon ; Park, Haeryong ; Chun, Kilsoo. / Modified ID-based threshold decryption and its application to mediated ID-based encryption. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 3841 LNCS 2006. pp. 720-725 (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)).
@inproceedings{988f8d36c4a441f8893ced6180bc7785,
title = "Modified ID-based threshold decryption and its application to mediated ID-based encryption",
abstract = "Chai, Cao and Lu first proposed an ID-based threshold decryption scheme without random oracles. Their approach is based on the Bilinear Diffie-Hellman Inversion assumption, and prove that it is selective chosen plaintext secure without random oracles. However, to ensure correctness of their ID-based threshold decryption scheme, it is necessary to guarantee that the shared decryption is performed correctly through some public verification function. We modify Chai et al.'s scheme to ensure that all decryption shares are consistent. We also present the first mediated ID based encryption scheme based on the Bilinear Diffie Hellman Inversion assumption without random oracles. In addition, we extend it into a mediated hierarchical ID-based encryption scheme.",
author = "Ju, {Hak Soo} and Kim, {Dae Youb} and Lee, {Dong Hoon} and Haeryong Park and Kilsoo Chun",
year = "2006",
month = "7",
day = "6",
doi = "10.1007/11610113_64",
language = "English",
isbn = "3540311424",
volume = "3841 LNCS",
series = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",
pages = "720--725",
booktitle = "Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)",

}

TY - GEN

T1 - Modified ID-based threshold decryption and its application to mediated ID-based encryption

AU - Ju, Hak Soo

AU - Kim, Dae Youb

AU - Lee, Dong Hoon

AU - Park, Haeryong

AU - Chun, Kilsoo

PY - 2006/7/6

Y1 - 2006/7/6

N2 - Chai, Cao and Lu first proposed an ID-based threshold decryption scheme without random oracles. Their approach is based on the Bilinear Diffie-Hellman Inversion assumption, and prove that it is selective chosen plaintext secure without random oracles. However, to ensure correctness of their ID-based threshold decryption scheme, it is necessary to guarantee that the shared decryption is performed correctly through some public verification function. We modify Chai et al.'s scheme to ensure that all decryption shares are consistent. We also present the first mediated ID based encryption scheme based on the Bilinear Diffie Hellman Inversion assumption without random oracles. In addition, we extend it into a mediated hierarchical ID-based encryption scheme.

AB - Chai, Cao and Lu first proposed an ID-based threshold decryption scheme without random oracles. Their approach is based on the Bilinear Diffie-Hellman Inversion assumption, and prove that it is selective chosen plaintext secure without random oracles. However, to ensure correctness of their ID-based threshold decryption scheme, it is necessary to guarantee that the shared decryption is performed correctly through some public verification function. We modify Chai et al.'s scheme to ensure that all decryption shares are consistent. We also present the first mediated ID based encryption scheme based on the Bilinear Diffie Hellman Inversion assumption without random oracles. In addition, we extend it into a mediated hierarchical ID-based encryption scheme.

UR - http://www.scopus.com/inward/record.url?scp=33745673615&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=33745673615&partnerID=8YFLogxK

U2 - 10.1007/11610113_64

DO - 10.1007/11610113_64

M3 - Conference contribution

AN - SCOPUS:33745673615

SN - 3540311424

SN - 9783540311423

VL - 3841 LNCS

T3 - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

SP - 720

EP - 725

BT - Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

ER -