{"title":"An identity-based group-oriented threshold encryption scheme","authors":"Jinghao Xing, Qiuliang Xu","doi":"10.1109/ASID.2011.5967409","DOIUrl":null,"url":null,"abstract":"In many broadcast systems, it is useful to send messages to some (not all) members of the whole group. And the ciphertext can only be decrypted with the participation of a certain number of receivers. In this paper, we construct an efficient identity-based group-oriented threshold encryption scheme. The sender can encrypt a single message for a dynamic k-member group which can be a subset of the n-member group. And at least t receivers are needed to decrypt the ciphertext, where 1≼t≼k≼n. Meanwhile, we provide the formal security proofs of this scheme in random oracle model.","PeriodicalId":328792,"journal":{"name":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","volume":"19 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ASID.2011.5967409","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In many broadcast systems, it is useful to send messages to some (not all) members of the whole group. And the ciphertext can only be decrypted with the participation of a certain number of receivers. In this paper, we construct an efficient identity-based group-oriented threshold encryption scheme. The sender can encrypt a single message for a dynamic k-member group which can be a subset of the n-member group. And at least t receivers are needed to decrypt the ciphertext, where 1≼t≼k≼n. Meanwhile, we provide the formal security proofs of this scheme in random oracle model.