Log in

Threshold decryption scheme with multiple policies

  • Cryptography
  • Published:
Wuhan University Journal of Natural Sciences

Abstract

Based on the difficulty in computing discrete logarithm and square root on some special conditions, we propose a basic threshold secret sharing scheme for multiple secrets with multiple policies, which allows a group of users to share multiple secret keys and only one secret shadow to be kept by each user. An efficient threshold decryption scheme with multiple policies is designed on the basis of the basic threshold scheme. This decryption scheme allows multiple secret keys to be shared among a group of users, and each user to keep only one secret shadow. Different public keys can be used to encrypt documents. If and only if the number of cooperated users who keep the secret shadows is greater than or equal to the threshold value of the corresponding secret key, they can cooperate to decrypt the documents. It is proved that the proposed scheme has very strong security, unless the attackers can solve the discrete logarithm problem and the square root problem.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price includes VAT (Germany)

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Blakley G R. Safeguarding Cryptographic Keys.Proceedings of the National Computer Conference, AFIPS Vol. 48. Montvale: AFIPS Press, 1979, 313–317.

    Google Scholar 

  2. Shamir A. How to Share a Secret.Communications of the ACM, 1979,24: 612–613.

    Article  MathSciNet  Google Scholar 

  3. Asmuth C, Bloom J. A Modular Approach to Key Safeguarding.IEEE Transactions of Information Theory, 1983,29: 208–210.

    Article  MathSciNet  Google Scholar 

  4. Blundo C, Cresti A, Santis D,et al. Fully Dynamic Secret Sharing Schemes.Cryptology-Crypto'93. LNCS 773. Heidelberg: Springer, 1994: 110–125.

    Google Scholar 

  5. Blundo C, Santis D, Crescenoz D,et al. Multisecret Sharing Schemes.Cryptology-Crypto'94, LNCS 839. Heidelberg: Springer, 1994, 150–163.

    Google Scholar 

  6. Pinch R G E. On-Line Multiple Secret Sharing.Electonics Letters, 1996,32: 187–188.

    Google Scholar 

  7. Hwang R J, Chang C C. An On-Line Secret Sharing Scheme for Multisecrets.Computer Communications, 1998,21: 170–176.

    Article  Google Scholar 

  8. Lee N Y. Threshold Signature Scheme with Multiple Signing Policies.IEEE Proceedings of Computers and Digital Techniques, 2001,148: 95–99.

    Article  Google Scholar 

  9. ElGamal T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms.IEEE Transactions of Information Theory, 1985,31: 469–472.

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wang Li-na.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (90104005, 90204011) and the Natural Science Foundation of Hubei Province (2002AB0039)

Biography: FEI Ru-chun (1969-), male, Associate professor research direction: information security and cryptography.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Ru-chun, F., Li-na, W. Threshold decryption scheme with multiple policies. Wuhan Univ. J. Nat. Sci. 10, 243–247 (2005). https://doi.org/10.1007/BF02828660

Download citation

  • Received:

  • Issue Date:

  • DOI: https://doi.org/10.1007/BF02828660

Key words

CLC number

Navigation