<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
	<front>
		<journal-meta>
			<journal-id journal-id-type="publisher-id">INFORMATICA</journal-id>
			<journal-title-group>
				<journal-title>Informatica</journal-title>
			</journal-title-group>
			<issn pub-type="epub">0868-4952</issn>
			<issn pub-type="ppub">0868-4952</issn>
			<publisher>
				<publisher-name>VU</publisher-name>
			</publisher>
		</journal-meta>
		<article-meta>
			<article-id pub-id-type="publisher-id">inf17404</article-id>
			<article-id pub-id-type="doi">10.15388/Informatica.2006.152</article-id>
			<article-categories>
				<subj-group subj-group-type="heading">
					<subject>Research article</subject>
				</subj-group>
			</article-categories>
			<title-group>
				<article-title>Adaptive Chosen Ciphertext Secure Threshold Key Escrow Scheme from Pairing</article-title>
			</title-group>
			<contrib-group>
				<contrib contrib-type="Author">
					<name>
						<surname>Long</surname>
						<given-names>Yu</given-names>
					</name>
					<email xlink:href="mailto:longyu@sjtu.edu.cn">longyu@sjtu.edu.cn</email>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Chen</surname>
						<given-names>Kefei</given-names>
					</name>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_000"/>
				</contrib>
				<contrib contrib-type="Author">
					<name>
						<surname>Liu</surname>
						<given-names>Shengli</given-names>
					</name>
					<xref ref-type="aff" rid="j_INFORMATICA_aff_001"/>
				</contrib>
				<aff id="j_INFORMATICA_aff_000">Department of Computer Science and Engineering, Shanghai Jiao Tong University &amp; National Laboratory of Modern Communications, 800 Dongchuan Road, Shanghai 200240, P. R. China</aff>
				<aff id="j_INFORMATICA_aff_001">Department of Computer Science and Engineering, Shanghai Jiao Tong University, 800 Dongchuan Road, Shanghai 200240, P. R. China</aff>
			</contrib-group>
			<pub-date pub-type="epub">
				<day>01</day>
				<month>01</month>
				<year>2006</year>
			</pub-date>
			<volume>17</volume>
			<issue>4</issue>
			<fpage>519</fpage>
			<lpage>534</lpage>
			<history>
				<date date-type="received">
					<day>01</day>
					<month>01</month>
					<year>2006</year>
				</date>
			</history>
			<abstract>
				<p>This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversary that can make corrupted servers to deviate from the protocol. The scheme is secure against threshold adaptive chosen-ciphertext attack. The formal proof of security is presented in the random oracle model, assuming the decision Bilinear Diffie-Hellman problem is computationally hard.</p>
			</abstract>
			<kwd-group>
				<label>Keywords</label>
				<kwd>threshold key escrow</kwd>
				<kwd>identity-based cryptography</kwd>
				<kwd>chosen-ciphertext attack</kwd>
				<kwd>pairing based cryptology</kwd>
			</kwd-group>
		</article-meta>
	</front>
</article>