Skip to main content
Article thumbnail
Location of Repository

Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing

By Yu Long, Kefei Chen and Shengli Liu

Abstract

This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversary that can make corrupted servers to deviate from the protocol. The scheme is secure against threshold adaptive chosen-ciphertext attack. The formal proof of security is presented in the random oracle model, assuming the decision Bilinear Diffie-Hellman problem is computationally hard

Year: 2006
OAI identifier: oai:CiteSeerX.psu:10.1.1.134.6027
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.mii.lt/informatica/... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.