CCA secure threshold KEM scheme against adaptive corruption attacks in standard model

Yuanju Gan, Licheng Wang, Jianhua Yan, Yixian Yang

Research output: Contribution to journalArticlepeer-review

Abstract

Most threshold key encapsulation mechanisms (KEM) have been studied in a weak model-static corruption model or random oracle model. In this paper, we propose a threshold KEM scheme with provable security based on the bilinear groups of composite order in the standard model. We use a direct construction from Boyen-Mei-Waters' KEM scheme to obtain a threshold KEM scheme that can withstand adaptive chosen ciphertext attacks (CCA) and adaptive corruption attacks. However, to achieve a higher security level, our construction does not increase overall additional size of ciphertext compare to other schemes.

Original languageEnglish
Pages (from-to)1245-1253
Number of pages9
JournalJournal of Software
Volume8
Issue number5
DOIs
Publication statusPublished - 2013
Externally publishedYes

Keywords

  • Adaptive corruption attacks
  • Bilinear groups of composite order
  • Chosen ciphertext attack
  • Key encapsulation mechanisms

Fingerprint

Dive into the research topics of 'CCA secure threshold KEM scheme against adaptive corruption attacks in standard model'. Together they form a unique fingerprint.

Cite this