Multi-recipient and threshold encryption based on hidden multipliers

10/13/2022
by   Vitaly Roman'kov, et al.
0

In this paper, a scheme is proposed that allow the dealer to encrypt messages in such a way that only one authorized coalition of parties (which the dealer chooses depending on the message) can decrypt. At the setup stage, each of the parties involved in the process receives an individual key from the dealer. To decrypt information, an authorized coalition of parties must cooperate to use their keys. Based on this scheme, we propose a threshold encryption scheme. For a given message f the dealer can choose any threshold m = m(f). More precisely, any set of parties of size at least m can evaluate f; any set of size less than m cannot do this. Similarly, the distribution of keys among the included parties can be done in such a way that authorized coalitions of parties will be given the opportunity to put a collective digital signature on any documents. This primitive can be generalized to the dynamic setting, where any user can dynamically join the pool S, as a possible recipient. In this case the new user receives a key from the dealer. Also any user can leave pool S. In both cases, already distributed keys of other users do not change. The main feature of the proposed schemes is that for a given n the keys are distributed once and can be used multiple times. This property distinguishes the proposed schemes from the most of such schemes known in the literature. The proposed scheme based on the idea of hidden multipliers in encryption. As a platform, one can use both multiplicative groups of finite fields and groups of invertible elements of commutative rings, in particular, multiplicative groups of residue rings. We propose two versions of this scheme.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/16/2021

Multiparty secret sharing based on hidden multipliers

Secret sharing schemes based on the idea of hidden multipliers in encryp...
research
11/13/2022

OpenPGP Email Forwarding Via Diverted Elliptic Curve Diffie-Hellman Key Exchanges

An offline OpenPGP user might want to forward part or all of their email...
research
11/11/2019

Collaborative Homomorphic Computation on Data Encrypted under Multiple Keys

Homomorphic encryption (HE) is a promising cryptographic technique for e...
research
08/16/2020

Efficient, Flexible and Secure Group Key Management Protocol for Dynamic IoT Settings

Many Internet of Things (IoT) scenarios require communication to and dat...
research
11/29/2019

RAMESSES, a Rank Metric Encryption Scheme with Short Keys

We present a rank metric code-based encryption scheme with key and ciphe...
research
05/18/2019

Discrete Logarithmic Fuzzy Vault Scheme

In this paper a three fuzzy vault schemes which integrated with discrete...
research
12/26/2018

Use the Keys Pre-Distribution KDP-scheme for Mandatory Access Control Implementation

The possibility of use the keys preliminary distribution KDP-scheme for ...

Please sign up or login with your details

Forgot password? Click here to reset