| In order to solve the problem of PKI certificate management, in1984,the identity-basedcryptography is propsed by Shamir. Identity-based encryption scheme does not use directly usedigital certificates, the user’s identity as a public key, which make management simpler, broadapplication prospects. Compared with the traditional Public Key Infrastructure, IBE eliminates theneed for public key certificates, which reduce the high cost for managing, authenticating public keyscertificates.The efficiency of Authenticated identity-based scheme is higher than that of the identity-basedencryption scheme, because it has less power and no one dot in the encryption stage,but there arealso key escrow problem, there are risks of leaks. In this paper, Firstly, combined with (t, n)threshold verifiable secret sharing scheme,a new private key sharing scheme is proposed, and withthe existing private key sharing scheme,a comparative analysis is made, analysis shows that thisscheme have a greater advantage in terms of efficiency and safety.Secondly, combined with (t, n) threshold verifiable secret sharing scheme and securemulti-party computation,a new anonymous private key sharing scheme is proposed, user private keysharing problem can be converted to the secret sharing problem for integers,a lot of bilinear pairingcomputations is reduced, the risk of compromising secret of the identity-based encryption scheme isreduced,the problem of excessive concentration of rights is avoided. combined with securemulti-party computation solve the problem of anonymity in the private key sharing,can be suitablefor any threshold parameter and really preserve the participants privacy that is the secret can bereconstructed without knowledge of which participants hold which shares. And through the analysisshows that this scheme is to prevent fraud or a single trusted center attack, but also to preventmultiple trusted center collusion attack.Finally, authenticated identity-based encryption scheme used in the secure exchange ofelectronic documents and e-mail. Two application models are proposed, which are based on theprivate sharing scheme proposed above. |