Font Size: a A A

Security Threshold Identity Based Decryption Scheme

Posted on:2010-01-12Degree:MasterType:Thesis
Country:ChinaCandidate:S M LouFull Text:PDF
GTID:2178360302466776Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
With the rapid development of internet techniques,more a nd more applications ex-change information through internet,and now w e can't imagine our life without internet.Internet brings much m ore convenience and advantage to us and it bring too much threatat the same time.Adversary can ear drop,modify and forge anything which broadcast oninternet without being detected by the parties who take part in communication,so confiden-tiality, integrity and availability must be maintained in a secure application. Cryptographyand network security are the most effective method to protect out network from attack. Thethreshold and identity-based cryptography are get much attention these years. This paperwill do some analysis on these parts.And then present a threshold identity-based decryptionscheme secure against chosen identity and ciphertext attacks. Our construction is based onthe Waters ibe present EUROCRYPT 2005. No full security scheme like this paper before.
Keywords/Search Tags:threshold identity-based decryption, identity-based encryption, securityagainst passive adversaries, Diffie-Hellman (BDH) Assumption
PDF Full Text Request
Related items