Provably Secure Identity-Based Threshold Decryption on Access Structure


The existing provably secure threshold decryption schemes based on the Lagrange interpolation can only be applied to the (t, n) threshold structure. The first provably secure identity-based threshold decryption scheme on access structure is proposed, in which the PKG gets the adversary structure from the access structure, and then according to the adversary… (More)
DOI: 10.1109/CIS.2014.23


1 Figure or Table