Abstract
Based on the difficulty in computing discrete logarithm and square root on some special conditions, we propose a basic threshold secret sharing scheme for multiple secrets with multiple policies, which allows a group of users to share multiple secret keys and only one secret shadow to be kept by each user. An efficient threshold decryption scheme with multiple policies is designed on the basis of the basic threshold scheme. This decryption scheme allows multiple secret keys to be shared among a group of users, and each user to keep only one secret shadow. Different public keys can be used to encrypt documents. If and only if the number of cooperated users who keep the secret shadows is greater than or equal to the threshold value of the corresponding secret key, they can cooperate to decrypt the documents. It is proved that the proposed scheme has very strong security, unless the attackers can solve the discrete logarithm problem and the square root problem.
Similar content being viewed by others
References
Blakley G R. Safeguarding Cryptographic Keys.Proceedings of the National Computer Conference, AFIPS Vol. 48. Montvale: AFIPS Press, 1979, 313–317.
Shamir A. How to Share a Secret.Communications of the ACM, 1979,24: 612–613.
Asmuth C, Bloom J. A Modular Approach to Key Safeguarding.IEEE Transactions of Information Theory, 1983,29: 208–210.
Blundo C, Cresti A, Santis D,et al. Fully Dynamic Secret Sharing Schemes.Cryptology-Crypto'93. LNCS 773. Heidelberg: Springer, 1994: 110–125.
Blundo C, Santis D, Crescenoz D,et al. Multisecret Sharing Schemes.Cryptology-Crypto'94, LNCS 839. Heidelberg: Springer, 1994, 150–163.
Pinch R G E. On-Line Multiple Secret Sharing.Electonics Letters, 1996,32: 187–188.
Hwang R J, Chang C C. An On-Line Secret Sharing Scheme for Multisecrets.Computer Communications, 1998,21: 170–176.
Lee N Y. Threshold Signature Scheme with Multiple Signing Policies.IEEE Proceedings of Computers and Digital Techniques, 2001,148: 95–99.
ElGamal T. A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms.IEEE Transactions of Information Theory, 1985,31: 469–472.
Author information
Authors and Affiliations
Corresponding author
Additional information
Foundation item: Supported by the National Natural Science Foundation of China (90104005, 90204011) and the Natural Science Foundation of Hubei Province (2002AB0039)
Biography: FEI Ru-chun (1969-), male, Associate professor research direction: information security and cryptography.
Rights and permissions
About this article
Cite this article
Ru-chun, F., Li-na, W. Threshold decryption scheme with multiple policies. Wuhan Univ. J. Nat. Sci. 10, 243–247 (2005). https://doi.org/10.1007/BF02828660
Received:
Issue Date:
DOI: https://doi.org/10.1007/BF02828660
Key words
- multiple secret keys
- threshold scheme
- secret shadow
- discrete logarithm
- square root
- threshold decryption scheme