Efficient construction of CCA-Secure threshold PKE based on hashed diffie-hellman assumption

  • Yuanju Gan*
  • , Lihua Wang
  • , Licheng Wang
  • , Ping Pan
  • , Yixian Yang
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

4 Citations (Scopus)

Abstract

In threshold public-key encryption (TPKE), the decryption key is divided into n shares, each one of which is given to a different decryption user in order to avoid single points of failure. A robust TPKE is that if threshold decryption of a valid ciphertext fails, the combiner can identify the decryption users that supplied invalid partial decryption shares. In this paper, we propose a practical and efficient TPKE scheme which is robust and non-interactive. Security against chosen-ciphertext attacks (CCAs) can be proved in the standard model under the hashed Diffie-Hellman assumption in bilinear groups. The security reduction is tight and simple. We use an instantiation hash function of the Kiltz's key encapsulation mechanism and Lai et al.'s chosen-ciphertext secure technique to construct a TPKE scheme. Moreover, our scheme is more simple and shown to be more efficient than currently existing CCA-secure TPKE schemes.

Original languageEnglish
Pages (from-to)1249-1257
Number of pages9
JournalComputer Journal
Volume56
Issue number10
DOIs
Publication statusPublished - Oct 2013
Externally publishedYes

Keywords

  • chosen-ciphertext security
  • hashed Diffie-Hellman assumption
  • standard model
  • threshold public-key encryption

Fingerprint

Dive into the research topics of 'Efficient construction of CCA-Secure threshold PKE based on hashed diffie-hellman assumption'. Together they form a unique fingerprint.

Cite this