Provably Secure Identity-based Threshold Key Escrow from Pairing.

Yu Long,Zheng Gong,Kefei Chen,Shengli Liu
2009-01-01
Abstract:This paper proposes an identity-based threshold key escrow scheme. The scheme is secure against identity-based threshold chosen-plaintext attack. It tolerates the passive adversary to access data of corrupted key escrow agency servers and the active adversary that can modify corrupted servers’ keys. The formal proof of security is presented in the random oracle model, assuming the Bilinear Di‐e-Hellman problem is computationally hard.
What problem does this paper attempt to address?