• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Long Yu, Xu Xian, Chen Kefei. Two Identity Based Threshold Cryptosystem with Reduced Trust in PKG[J]. Journal of Computer Research and Development, 2012, 49(5): 932-938.
Citation: Long Yu, Xu Xian, Chen Kefei. Two Identity Based Threshold Cryptosystem with Reduced Trust in PKG[J]. Journal of Computer Research and Development, 2012, 49(5): 932-938.

Two Identity Based Threshold Cryptosystem with Reduced Trust in PKG

More Information
  • Published Date: May 14, 2012
  • In the traditional identity based cryptosystems, since private key generator (PKG) is able to compute the private key corresponding to any identity, the malicious activities of PKG would be hard to find, which restricts the use of identity based cryptosystems. People have employed multiple PKGs to solve this problem. However it brings other problems. In this paper, two identity based threshold cryptosystems are proposed, which reduce the trust in PKG. The traceable identity based encryption technique suggested by Goyal is used, which successfully restricts the potential misbehaviors of PKG, and the idea of public verifiable encryption which is widely used in the threshold cryptosystems to achieve distributed decryption. These two schemes solve the malicious PKG tracing problem effectively, and if PKG generates more than one private key to a single user, the misbehavior could be detected with evidence. We define the formal model of identity based threshold cryptosystem with reduced trust in PKG. We also prove the two schemes' security against the adaptive chosen ciphertext attack, the find key attack and the compute new key attack under the formal security model. The result shows that their security is based on the truncated augmented bilinear Diffie-Hellman exponent assumption.
  • Related Articles

    [1]Fu Yingxun, Wen Shilin, Ma Li, Shu Jiwu. Survey on Single Disk Failure Recovery Methods for Erasure Coded Storage Systems[J]. Journal of Computer Research and Development, 2018, 55(1): 1-13. DOI: 10.7544/issn1000-1239.2018.20160506
    [2]Bi Yahui, Jiang Suyang, Wang Zhigang, Leng Fangling, Bao Yubin, Yu Ge, Qian Ling. A Multi-Level Fault Tolerance Mechanism for Disk-Resident Pregel-Like Systems[J]. Journal of Computer Research and Development, 2016, 53(11): 2530-2541. DOI: 10.7544/issn1000-1239.2016.20150619
    [3]Li Xiangnan, Zhang Guangyan, Li Qiang, Zheng Weimin. A Survey on the Approaches of Building Solid State Disk Arrays[J]. Journal of Computer Research and Development, 2016, 53(9): 1893-1905. DOI: 10.7544/issn1000-1239.2016.20150910
    [4]Sun Jian, Li Zhanhuai, Zhang Xiao, Wang Huifeng, Zhao Xiaonan. A Statistic-Based Method for Hard-Disk Power Consumption in Storage System[J]. Journal of Computer Research and Development, 2016, 53(7): 1517-1531. DOI: 10.7544/issn1000-1239.2016.20160133
    [5]Wang Jinbao, Gao Hong, Li Jianzhong, Yang Donghua. Processing String Similarity Search in External Memory Efficiently[J]. Journal of Computer Research and Development, 2015, 52(3): 738-748. DOI: 10.7544/issn1000-1239.2015.20130683
    [6]Shen Yan, Zhu Yuquan, Liu Chunhua. Incremental FP_GROWTH Algorithm Based on Disk-resident 1-itemsets Counting[J]. Journal of Computer Research and Development, 2015, 52(3): 569-578. DOI: 10.7544/issn1000-1239.2015.20131436
    [7]Shen Yan, Song Shunlin, Zhu Yuquan. Mining Algorithm of Association Rules Based on Disk Table Resident FP-TREE[J]. Journal of Computer Research and Development, 2012, 49(6): 1313-1322.
    [8]Liu Runtao, Hao Zhongxiao. A Multi-Order Based Index Structure for Spatial Data—MOIS-tree[J]. Journal of Computer Research and Development, 2010, 47(5): 849-857.
    [9]Weng Dawei, Yin Yilong, Yang Gongping, and Qi Xiuyan. Singular Point Extraction from Fingerprint Based on Gaussian-Hermite Moment and Improved Poincare Index[J]. Journal of Computer Research and Development, 2008, 45(11): 1974-1984.
    [10]Hao Zhongxiao, Wang Yudong, He Yunbin. Line Segment Nearest Neighbor Query of Spatial Database[J]. Journal of Computer Research and Development, 2008, 45(9): 1539-1545.

Catalog

    Article views (660) PDF downloads (447) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return