<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.0 20120330//EN" "JATS-journalpublishing1.dtd"><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article"><front><journal-meta><journal-id journal-id-type="publisher-id">INFORMATICA</journal-id><journal-title-group><journal-title>Informatica</journal-title></journal-title-group><issn pub-type="epub">0868-4952</issn><issn pub-type="ppub">0868-4952</issn><publisher><publisher-name>VU</publisher-name></publisher></journal-meta><article-meta><article-id pub-id-type="publisher-id">info21301</article-id><article-id pub-id-type="doi">10.15388/Informatica.2010.290</article-id><article-categories><subj-group subj-group-type="heading"><subject>Research article</subject></subj-group></article-categories><title-group><article-title>An Computation-Efficient Generalized Group-Oriented Cryptosystem</article-title></title-group><contrib-group><contrib contrib-type="Author"><name><surname>Chang</surname><given-names>Ting-Yi</given-names></name><email xlink:href="mailto:tychang@cc.ncue.edu.tw">tychang@cc.ncue.edu.tw</email><xref ref-type="aff" rid="j_INFORMATICA_aff_000"/></contrib><aff id="j_INFORMATICA_aff_000">Graduate Institute of e-Learning National Changhua University of Education, No. 1, Jin-De Road, Changhua City, Taiwan, ROC</aff></contrib-group><pub-date pub-type="epub"><day>01</day><month>01</month><year>2010</year></pub-date><volume>21</volume><issue>3</issue><fpage>307</fpage><lpage>319</lpage><history><date date-type="received"><day>01</day><month>02</month><year>2008</year></date><date date-type="accepted"><day>01</day><month>04</month><year>2010</year></date></history><abstract><p>A Group-Oriented Cryptosystem (GOC) allows a sender to encrypt a message sent to a group of users so only the specified sets of users in that group can cooperatively decrypt the message. Recently, Li et al. pointed out unauthorized sets in the receiving group can recover the encrypted messages in Yang et al.'s GOC; and they further repaired this security flaw. However, the improved GOC contains inexact security analysis. Further, conversion of the scheme into a threshold cryptosystem results in inefficiency. This study enhances Li et al.'s GOC, both in that it achieves the requirements of GOC but also that it can be efficiently converted into a threshold cryptosystem. Under the decisional Diffie–Hellman problem assumption, the proposed scheme is demonstrated to be provably secure against chosen plaintext attacks.</p></abstract><kwd-group><label>Keywords</label><kwd>group-oriented cryptosystem</kwd><kwd>threshold cryptosystem</kwd><kwd>access structure</kwd><kwd>provable security</kwd><kwd>decisional Diffie–Hellman problem</kwd></kwd-group></article-meta></front></article>