Browse > Article
http://dx.doi.org/10.4134/CKMS.2009.24.1.153

CRYPTANALYSIS OF A DYNAMIC THRESHOLD DECRYPTION SCHEME  

Kim, Ki-Tae (DEPARTMENT OF MATHEMATICS INHA UNIVERSITY)
Lim, Seong-An (DEPARTMENT OF MATHEMATICS INHA UNIVERSITY)
Yie, Ik-Kwon (DEPARTMENT OF MATHEMATICS INHA UNIVERSITY)
Kim, Kyung-Hee (DEPARTMENT OF MATHEMATICS YONSEI UNIVERSITY)
Publication Information
Communications of the Korean Mathematical Society / v.24, no.1, 2009 , pp. 153-159 More about this Journal
Abstract
In this paper, we analyze a dynamic threshold decryption scheme proposed by Long et al. It was claimed that the scheme allows to renew the master key, or to add/remove or update a decryption server, without leaking any information on the master key and changing other decryption server's secret keys. We present an attack to Long et al's scheme by using the fact that it renews a decryption server's secret key without changing other decryption server's secret shares.
Keywords
bilinear pairing; cryptography; dynamic threshold decryption;
Citations & Related Records

Times Cited By SCOPUS : 0
연도 인용수 순위
  • Reference
1 D. Boneh and X. Boyen, Efficienty Selective-ID Secure Identity based encryption scheme without random oracles, Advances in Cryptology-Eurocrypt 04, LNCS, Vol. 3027, pp. 223-238, 2004.   DOI
2 D. Boneh and M. Franklin, Identity-based encryption from the Weil pairing, Advances in Cryptology-Crypto 2001, LNCS Vol. 2139, pp. 213-229, Springer-Verlag, 2001.   DOI   ScienceOn
3 Z. Chai, Z. F. Cao, and R. X. Lu, ID-based threshold decryption without random oracles and its application in key escrow, Inforsec 2004, ACM press, pp. 119-124, 2004.   DOI
4 B. Libert and J. J. Quisquater, Efficient revocation and threshold pairing based cryp-tosystems, PODC 2003, ACM press, pp. 163-171, 2003.   DOI
5 Y. Long and K.-F. Chen, Construction of dynamic threshold decryption scheme from pairing, International Journal of Network Security, Vol.2, No. 2, pp. 111-113, 2006.
6 A. Shamir, Identity based cryptosystems and signature schemes, Advances in Cryptology-Crypto 1984, LNCS Vol. 196, pp. 47-53, Springer-Verlag, 1984.