Identity-Based Threshold Decryption on Access Structure  

Identity-Based Threshold Decryption on Access Structure

在线阅读下载全文

作  者:秦华旺 朱晓华 戴跃伟 

机构地区:[1]School of Automatization,Nanjing University of Science and Technology

出  处:《Journal of Shanghai Jiaotong university(Science)》2011年第4期485-489,共5页上海交通大学学报(英文版)

基  金:the National Natural Science Foundation of China(No.60374066)

摘  要:For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares.The generation and distribution of private key shares,the encryption,the decryption and the combination are introduced in detail.The validity and security of the scheme are proved and analyzed.Comparisons with the existing schemes show that the proposed scheme is more flexible.For the applied limitation of the existing threshold decryption schemes based on the (t, n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares. The generation and distribution of private key shares, the encryption, the decryption and the combination are introduced in detail. The validity and security of the scheme are proved and analyzed. Comparisons with the existing schemes show that the proposed scheme is more flexible.

关 键 词:threshold decryption access structure IDENTITY CRYPTOGRAPHY information security 

分 类 号:TP393[自动化与计算机技术—计算机应用技术]

 

参考文献:

正在载入数据...

 

二级参考文献:

正在载入数据...

 

耦合文献:

正在载入数据...

 

引证文献:

正在载入数据...

 

二级引证文献:

正在载入数据...

 

同被引文献:

正在载入数据...

 

相关期刊文献:

正在载入数据...

相关的主题
相关的作者对象
相关的机构对象