Journal of Beijing University of Posts and Telecommunications

  • EI核心期刊

Journal of Beijing University of Posts and Telecommunications ›› 2020, Vol. 43 ›› Issue (4): 83-87.doi: 10.13190/j.jbupt.2019-239

• REPORTS • Previous Articles     Next Articles

A Threshold Public Key Encryption via Dual Regev Scheme

LI Zeng-peng1, WANG Jiu-ru2, ZHANG Wen-yin2, MA Chun-guang3   

  1. 1. College of Computer Science and Technology, Qingdao University, Qingdao 266071, China;
    2. School of Information Science and Engineering, Linyi University, Linyi 276000, China;
    3. School of Computer Science and Engineering, Shandong University of Science and Technology, Jinan 266071, China
  • Received:2019-11-09 Published:2020-08-15

Abstract: Aiming at the problem that Regev scheme cannot effectively resist key recovery attack, a threshold public key encryption scheme is proposed based on Gentry-Peikert-Vaikuntanathan (GPV) scheme. The scheme is mainly composed of a distributed key generation protocol and an effective non-interactive decryption protocol. It combines Shamir's secret sharing algorithm and Lagrangian algorithm, which make it resistant to static and passive adversary buying attacks. The correctness of the proposed scheme is proved through theoretical analysis. Moreover, under the universal composable framework, the security is verified.

Key words: lattice-based cryptography, threshold cryptosystem, learning with errors, security protocol

CLC Number: