Articles

Identity-based threshold decryption on access structure

Expand
  • School of Automatization, Nanjing University of Science and Technology, Nanjing 210094, China

Online published: 2025-06-27

Abstract

For the applied limitation of the existing threshold decryption schemes based on the (t, n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares. The generation and distribution of private key shares, the encryption, the decryption and the combination are introduced in detail. The validity and security of the scheme are proved and analyzed. Comparisons with the existing schemes show that the proposed scheme is more flexible. © Shanghai Jiaotong University and Springer-Verlag Berlin Heidelberg 2011.

Cite this article

Qin H.-W.; Zhu X.-H.; Dai Y.-W. . Identity-based threshold decryption on access structure[J]. Journal of Shanghai Jiaotong University(Science), 2011 , 16(4) : 485 -489 . DOI: 10.1007/s12204-011-1177-5

Outlines

/