Browse > Article
http://dx.doi.org/10.13089/JKIISC.2012.22.4.733

The Conversion method from ID-based Encryption to ID-based Dynamic Threshold Encryption  

Kim, Mi-Lyoung (Graduate School of Information Security, Korea University)
Kim, Hyo-Seung (Graduate School of Information Security, Korea University)
Son, Young-Dong (Graduate School of Information Security, Korea University)
Lee, Dong-Hoon (Graduate School of Information Security, Korea University)
Abstract
Dynamic threshold public-key encryption provides dynamic setting of the group of all users, receivers and the threshold value. Over recent years, there are many studies on the construction of scheme, called ID-based dynamic threshold encryption, which combines the ID-based encryption with dynamic threshold encryption. In this paper, we analyze the ID-based dynamic threshold encryption proposed by Xing and Xu in 2011, and show that their scheme has a structural problem. We propose a conversion method from ID-based encryption which uses the bilinear map to ID-based dynamic threshold encryption. Additionally, we prove this converted scheme has CPA security under the full model.
Keywords
ID-based encryption; dynamic threshold encryprion; conversion mehtod;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Dan Boneh and Xavier Boyen, "Efficient selective-ID secure identity -based encryption without random oracles," Advances in Cryptology, EUROCRYPT '04, LNCS 3027, pp. 223-238, 2004.
2 Dan Boneh, Xavier Boyen, and Shai Halevi. "chosen ciphertext secure public-key threshold encryption without random oracles," CT-RSA'06, LNCS 3860, pp. 226-243, 2006.
3 Dan Boneh and Matt Franklin, "identity-based encryption from the weil pairing," Advances in Crypto- logy, CRYPT'01, LNCS 2139, pp. 213-229, 2001.
4 J. Baek and Y. Zheng, "identity-based threshold decryption," public-key Cryptography, PKC'04, LNCS 2947, pp. 262-276, 2004.
5 R. Canetti and S. Goldwasser, "An efficient threshold public-key cryptosystem secure against adaptive chosen ciphertext attack," Advances in Cryptology, EUROCRYPT'99, LNCS 1592, pp. 90-106, 1999.
6 Yvo Desmedt and Yair Frankel. "Threshold cryptosystems," Advances in Cryptology, CRYPTO'89, LNCS 435, pp. 307-315, 1990.
7 V. Daza, J. Herranz, P. Morillo, and C. Rtextmdafols, "CCA2-secure thre- shold broadcast encryption with shorter ciphertexts," Provable Sec- urity'07, LNCS 4784, pp. 35-50, 2007.
8 Cecile Delerablee and David Pointcheval, "Dynamic threshold public-key encryption," Advances in Cryptology, CRYPTO'08, LNCS 5157, pp. 317-334, 2008.
9 B. Libert and J.-J. Quisquater, "Efficient revocation and threshold pairing based cryptosystems," ACM Symposium on Principles of Distributed Computing - PODC'03, pp. 163-171, July, 2003.
10 Adi Shamir, "How to share a secret." Communications of the ACM, pp. 612- 613, Nov, 1979.
11 Adi Shamir, "Identity-based cryptosystems and signature schemes," Advances in Cryptology, LNCS 196, pp. 47-53, 1985.
12 Amit Sahai and Brent Waters, "Fuzzy identity-based encryption," Advances in Cryptology, EUROCRYPT'05, LNCS 3494, pp. 457-473, 2005.
13 Brent Waters, "Efficient identity- based encryption without random oracles," Advances in Cryptology, EUROCRYPT '05, LNCS 3494, pp. 114-127, 2005.
14 Jinghao Xing, Qiuliang Xu, "An identitybased group-oriented thresh- old encryption scheme," Anti- Counterfeiting, Security and Identification (ASID), 2011 IEEE, pp. 30-33, June, 2011.