Header menu link for other important links
X
Lattice-based identity-based resplittable threshold public key encryption scheme
Published in Taylor and Francis Ltd.
2016
Volume: 93
   
Issue: 2
Pages: 289 - 307
Abstract
Threshold public key encryption is a cryptographic primitive where a secret key of an organization is distributed among special members called decryption servers (insiders) and a certain threshold number of insiders must cooperate to decrypt any ciphertext. Threshold public key encryption with an additional randomized algorithm Tsplit is called resplittable threshold public key encryption (RTPKE). Cryptographic primitive RTPKE was introduced by Hanaoka et al. [Generic construction of chosen ciphertext secure proxy re-encryption, in CT-RSA, San Francisco, CA, USA, LNCS, O. Dunkelman, ed., Springer-Verlag, Heidelberg, 2012, pp. 349–364] in a generic construction of chosen ciphertext attack secure proxy re-encryption scheme. In MIST 2013 conference Singh et al. [Lattice based efficient threshold public key encryption scheme, J. Wirel. Mob. Netw. Ubiquitous Comput. Dependable Appl. (JoWUA) 4(4) (2013), pp. 93–107] presented lattice-based RTPKE scheme based on Regev's LWE [On lattices, learning with errors, random linear codes, and cryptography, in STOC, Baltimore, MD, USA, H.N. Gabow and R. Fagin, eds., ACM, University of Wales, Cardiff, 2005, pp. 84–93] assumption. In this paper, we propose lattice-based RTPKE scheme in the identity-based setting. © 2014 Taylor & Francis.
About the journal
JournalData powered by TypesetInternational Journal of Computer Mathematics
PublisherData powered by TypesetTaylor and Francis Ltd.
ISSN00207160
Open AccessNo
Concepts (12)
  •  related image
    PUBLIC KEY CRYPTOGRAPHY
  •  related image
    Random errors
  •  related image
    Security of data
  •  related image
    CHOSEN CIPHERTEXT ATTACK
  •  related image
    CRYPTOGRAPHIC PRIMITIVES
  •  related image
    IDENTITY BASED ENCRYPTION
  •  related image
    Lattice
  •  related image
    Learning with errors
  •  related image
    PROXY RE-ENCRYPTION SCHEMES
  •  related image
    Randomized algorithms
  •  related image
    THRESHOLD PUBLIC-KEY ENCRYPTIONS
  •  related image
    Cryptography