Issue |
RAIRO-Theor. Inf. Appl.
Volume 53, Number 1-2, January–June 2019
|
|
---|---|---|
Page(s) | 67 - 84 | |
DOI | https://doi.org/10.1051/ita/2019001 | |
Published online | 15 February 2019 |
An efficient certificateless multi-receiver threshold decryption scheme
1
School of Mathematical Sciences, Xiamen University,
Xiamen
361005, China.
2
School of Mathematical Sciences, Guizhou Normal University,
Guiyang
550001, China.
3
School of Mathematical Sciences, Xinjiang Normal University,
Urumqi
830017, China.
* Corresponding author: denglunzhi@163.com
Received:
23
April
2018
Accepted:
14
January
2019
Threshold decryption allows only quorum cooperate users to decrypt ciphertext encrypted under a public key. However, such threshold decryption scheme cannot be applied well in this situation where all users have their public and private key pairs, but do not share any private keys corresponding to the public keys, such as mobile network featured with dynamic character. The direct way to achieve threshold decryption in this case is to divide the message into several pieces and then encrypt these pieces with the public keys of different users. However, this is very inefficient. Multireceiver threshold decryption scheme that could be applied efficiently in the above situation. Recently, some certificateless (ID-based) multireceiver threshold decryption (signcryption) schemes are introduced. But the bilinear pairings are used in most of the existing schemes. In this paper, we propose an efficient certificateless threshold decryption scheme using elliptic curve cryptography (ECC) without bilinear pairing. Performance analysis shows that the proposed scheme has lower computation cost than existing some threshold decryption schemes in both encryption and decryption process. Security analysis shows that our scheme is IND-CCA secure, and no one outside of selected receivers can disclose receivers identities, against the adversaries defined in CL-PKC system under the random oracle model.
Mathematics Subject Classification: 94A60
Key words: certificateless cryptography / threshold decryption / multi-receiver encryption / confidentiality / anonymity
© EDP Sciences, 2019
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.